At Bold Promo, we understand that intellectual property, from custom logos to proprietary marketing data, is the most valuable asset of a brand. Our commitment to security goes beyond the print shop floor; it is embedded in our digital infrastructure. Based in Miami, FL, we operate with a "Security-First" mindset to ensure your data is protected from unauthorized access, disclosure, or loss.
We utilize a multi-layered hardware and software stack to maintain the Confidentiality, Integrity, and Availability of your data.
Advanced Encryption: All sensitive data is secured using AES-256 (Advanced Encryption Standard) at rest. During transmission, data is shielded by TLS 1.3 (Transport Layer Security) protocols, ensuring that your designs remain private from upload to production.
Immutable Data Protection: We employ BTRFS-based Immutable Snapshots. This technology creates a "point-in-time" copy of our file system that cannot be altered or deleted by ransomware, providing us with a near-instant recovery path in the event of a cyber incident.
WORM Compliance: For critical archival data, we utilize Write Once, Read Many (WORM) storage folders. This ensures that once a project record is finalized, it cannot be tampered with or accidentally overwritten.
Network Segmentation: Our production environment is partitioned using VLAN (Virtual Local Area Network) technology. This ensures that our high-end decoration equipment is isolated from our public-facing systems, preventing lateral threat movement.
Access to your data is strictly governed by the Principle of Least Privilege.
Multi-Factor Authentication (MFA): We enforce mandatory MFA for all employees accessing our internal servers. This adds a critical layer of defense beyond passwords, utilizing biometric or hardware-based verification.
Role-Based Access Control: Only team members directly involved in your project (designers, production managers, etc.) are granted access to your specific files.
We respect your privacy and follow stringent guidelines on how your information is used:
Purpose Limitation: We only collect the information necessary to fulfill your orders and provide high-quality service. Your designs are never shared with unauthorized third parties.
Secure Disposal: When data is no longer required for business or legal purposes, it is purged using secure deletion protocols that overwrite the physical disk space, making recovery impossible.
We treat cybersecurity as a pillar of our Corporate Social Responsibility (CSR). We undergo regular internal audits to ensure our security posture evolves alongside emerging global threats.
Sylvan Faber
co-CEO / CTO