JobsiteOn

Security Commitments Overview

How JobsiteOn protects your data with encryption, infrastructure security, access controls, compliance practices, and incident response procedures.

Maya Thompson
Written by Maya ThompsonUpdated over a month ago8 min readBeginner

What this guide covers

This guide explains the security measures JobsiteOn uses to protect your data. You will learn about data encryption, infrastructure security, access controls, compliance certifications, incident response procedures, and privacy practices. Understanding these commitments helps you and your team make informed decisions about the data you store in the platform.

Before you begin

Data encryption

In transit

All data transmitted between your browser and JobsiteOn servers is encrypted using TLS 1.2 or higher. This applies to:

You can verify encryption by checking for the padlock icon in your browser's address bar when using JobsiteOn.

At rest

All data stored in JobsiteOn databases is encrypted at rest using AES-256 encryption. This includes:

Encryption keys are managed through a dedicated key management service with automatic rotation.

Sensitive fields

Certain fields receive additional encryption beyond the database-level encryption:

Infrastructure security

Hosting

JobsiteOn runs on enterprise-grade cloud infrastructure with:

Network isolation

Patch management

Access controls

For your team

JobsiteOn's role-based access control system ensures each team member sees only what they need:

See Set Up Roles and Permissions for detailed permission tables.

For JobsiteOn staff

Authentication

Compliance

Standards and frameworks

JobsiteOn aligns its security program with industry standards:

Data residency

All production data is stored in data centers located in the United States. If data residency requirements change, we will notify customers in advance.

Vendor security

Third-party services used by JobsiteOn (cloud hosting, email delivery, payment processing) are evaluated for security before integration and monitored on an ongoing basis. Each vendor must meet minimum security standards comparable to our own.

Incident response

How we handle security incidents

JobsiteOn maintains a documented incident response plan with the following phases:

  1. Detection -- automated monitoring, alerting, and anomaly detection identify potential incidents in real time.
  2. Triage -- the on-call security team assesses severity and scope within 30 minutes of detection.
  3. Containment -- affected systems are isolated to prevent further impact.
  4. Eradication -- the root cause is identified and eliminated.
  5. Recovery -- affected systems are restored and verified.
  6. Communication -- affected customers are notified within 72 hours of confirmed incidents, or sooner when required by regulation.
  7. Post-mortem -- every incident results in a written analysis and action items to prevent recurrence.

Reporting a security concern

If you discover a potential vulnerability or security issue:

Privacy practices

Data you own

Your workspace data (contacts, properties, jobs, invoices, files) belongs to you. JobsiteOn does not sell, share, or use your data for advertising or training purposes.

Data we collect

JobsiteOn collects limited operational data to run the service:

Data retention

Data export

You can export all of your workspace data at any time from /settings > Workspace > Data. The export includes contacts, properties, jobs, quotes, invoices, and file attachments in standard formats (CSV and JSON).

JobsiteOn uses strictly necessary cookies for authentication and session management. We do not use third-party advertising cookies. Analytics cookies are opt-in where required by local regulation.

Status and uptime

Status page

Check the current system status and historical uptime at our public status page. The status page shows:

Uptime commitment

JobsiteOn targets 99.9% uptime for the production environment. Scheduled maintenance is performed during low-traffic hours with advance notice.

Best practices for your team

Troubleshooting

I received a suspicious email claiming to be from JobsiteOn

Check the sender address. Legitimate emails come from @jobsiteon.com domains only. If the email looks suspicious, do not click any links. Forward it to security@jobsiteon.com for investigation.

I think my account has been compromised

  1. Change your password immediately from /settings > Account > Password.
  2. Review recent activity in your workspace for unauthorized changes.
  3. Contact support@jobsiteon.com to report the incident and request a security review.

I need a copy of the SOC 2 report

Contact trust@jobsiteon.com with your company name and a brief description of why you need the report. We share SOC 2 reports under NDA with customers and prospective customers.

FAQ

Does JobsiteOn have access to my payment card numbers?

No. Payment card processing is handled by our PCI-compliant payment processor. JobsiteOn never stores, processes, or transmits raw card numbers.

Can I enable two-factor authentication?

Two-factor authentication is planned for a future release. For now, use a strong, unique password and enable browser-based password manager autofill.

Where is my data stored?

All production data is stored in data centers in the United States.

Can I delete my account and all data?

Yes. Contact support to request complete account and data deletion. The process takes up to 30 days to complete.

How do I stay informed about security updates?

Follow the public status page and subscribe to email notifications for security advisories.

Did this answer your question?

Related Articles