Working securely with our clients’ data is top of mind. Whether we’re managing your ecommerce orders, analyzing your click data, or optimizing your mail postage, our team strives to attain the highest standards.certifications & standards
Values drive culture, and culture drives behaviors. Our organization starts with a “people-first” culture coupled with a focus on process development and monitoring and reporting. We foster a continuous-improvement mindset and a security orientation, which are reinforced by ongoing external audits such as ISO, SOC 2, PCI and HITRUST.certifications & standards
Sustainability and leading with environmental initiatives are second nature to ENPOINTE. We’re leading the printing industry through recycling of unutilized materials, support for soy ink printing, providing carbon-neutral material options, and participation in material chain-of-custody programs via Forest Stewardship Council® (FSC-C022483) and Sustainable Forestry Initiative® (SFI-00549).certifications & standards
The ENPOINTE systems have been designed with the assumption that certain controls would be placed in operation by our clients which complement the controls at ENPOINTE. These include:
USER PASSWORDS PROVIDED TO ENPOINTE STAFF
When providing ENPOINTE with user names and passwords to retrieve user data, clients are responsible for providing user names and passwords that use strong levels of security.
PASSWORDS ON ENPOINTE SYSTEMS
Clients are responsible for periodically requesting password changes on accounts used to access ENPOINTE’s web-based systems such as SFTP, InSite, DirectConnect, WebHouse, Mediaplatter, etc.
SECURITY OF DATA FILES DURING TRANSIT TO ENPOINTE
Clients are responsible for the security of the data files while they are in transit to ENPOINTE, including file encryption and address validation processes.
SECURITY OF DATA FILES AFTER TRANSMISSION FROM ENPOINTE
Clients are responsible for the security of the requested data files and physical media after they have been received from ENPOINTE. ENPOINTE encourages clients to implement appropriate physical and network security controls, along with user education programs.