CMDI Data Security
The wonders of big data go hand-in-hand with the responsibility of serious data security. We understand that the confidentiality, integrity, and availability of your data is vital to your organization’s success.
For more information about security features on the Crimson platform, please visit the Crimson Security page.
Keeping Data Safe
CMDI keeps your fundraising and donor data secure using the standards established by the PCI Security Council. When credit card numbers are received in hard copy form, they are handled in secure and monitored environments. Physical credit card numbers are blacked-out and stored safely after transactions are processed through Crimson’s integration with Anedot. Additionally, credit card numbers are never written or stored in our software or hardware, and extensive penetration tests are conducted on our systems as well.
Security at CMDI’s Office
CMDI takes every effort to secure the physical premises of our office and caging facilities. These security standards include:
Separate biometric access control to enter caging facility and offices
Separate biometric access control to enter caging facility and offices
Dedicated mail intake room, opening and sorting room, document scanning room, and data entry room with their own biometric access and video surveillance
Tracking of asset removal
Discover Crimson.
Set up a custom demo to see how the Crimson platform can help your Republican organization.
Secure Data Centers
The Crimson application and your data are maintained at a secure, offsite data center that maintains SSAE 16 Type II compliance. This top-tier data center provides carrier-level support, including:
Safety
Building engineered for local seismic, storm, and flood risks
Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression
Humidity and temperature control
Redundant (N+1) cooling systems, CPS/UPS systems, and diesel generators with on-site diesel fuel storage
Redundant power distribution units (PDUs)
VESDA (very early smoke detection apparatus)
Security
24-hour manned security, including foot patrols and perimeter inspections
Biometric scanning and card readers for access
Dedicated concrete-walled data center rooms
Computing equipment in access-controlled steel cages
360-degree video surveillance throughout facility and perimeter
Tracking of asset removal