RedLink Security and Acceptable Use

At RedLink, we are committed to security of our applications and our websites, www.redlink.com and redlink-network.org (the “Sites”) (together, the “Services”). Throughout our legal statements, those who have purchased or signed-up for RedLink services (the “Services”) are called “Subscribers” and their customers are called “Customers.” Visitors to our website who are neither Subscribers or Customers are “Visitors.”

RedLink offers data and business intelligence services to libraries and publishers. We are proud of the trust that our Subscribers and their Customers place in us.

 

Security

RedLink employs industry-standard security and encryption technologies concerning the Sites and Services. However, no system is perfectly secure or reliable, the Internet is an inherently insecure medium, and the reliability of hosting services, Internet intermediaries, your Internet service provider, and other service providers cannot be assured. We take the following steps to maintain the highest level of security:

  • Secure web encryption (256-bit SSL). Your transmitted data is kept safe through one of the highest encryption standard available: 265-bit SSL. This is the same technology banks and financial institutions use to keep your account information safe. All account information you provide, including passwords and personal details, is protected using this technological standard.
  • Storage and firewalls. We use industry-standard data storage and firewall technologies to ensure that your information is always backed up in a secure location. Our system also stores backups in multiple secure locations to ensure availability in case of local disruptions.
  • Secure data centers. Our data centers maintain several layers of security to control access, including biometric scanning, keycard, retina scan, and PIN restrictions. Security cameras monitor all locations 24/7, and onsite staff protect against unauthorized entry. In each facility, our equipment is also kept in locked containers, with additional security safeguards in place to ensure only permitted technicians gain access.
  • Two-step authentication. You have the option to add an extra layer of security to your account with two-step authentication. Once activated, we will send a code to your phone that you’ll need to verify when you login.
  • Continuous monitoring. Our self-healing and self-alerting services means that our team reviews any questionable transactions against benchmarked performance and service behavior standards.

 

Acceptable Use

We trust our Subscribers, Customers, and Visitors to use our Services responsibly. To this end, you agree not to misuse RedLink Services.

For example, you must not, and must not attempt to, use the RedLink Services to do the following things:

  • probe, scan, or test the vulnerability of any system or network;
  • breach or otherwise circumvent any security or authentication measures;
  • access, tamper with, or use non-public areas of the services, shared areas of the services you have not been invited to, or RedLink’s (or our service providers’) computer systems;
  • interfere with or disrupt any user, host, or network, for example by sending a virus, overloading, flooding, spamming, or mail-bombing any part of the Services;
  • plant malware or otherwise attempt to use the Service to distribute malware;
  • access or search the services by any means other than our publicly supported interfaces (for example, “scraping”);
  • use the services to attempt to send unsolicited communications, promotions or advertisements, or spam;
  • send altered, deceptive or false source-identifying information, including “spoofing” or “phishing”;
  • publish anything that is fraudulent, misleading, or infringes another’s rights;
  • impersonate or misrepresent your affiliation with any person or entity;
  • violate the law in any way, or to violate the privacy of others, or to defame others.

RedLink reserves the right to remove any content on the Sites or Services that it determines, in its own discretion, violates this Acceptable Use Policy.  We may also remove content as described in the RedLink Terms of Services, under “Notices of Copyright Infringement.”

Last updated March 2017

This is a unique website which will require a more modern browser to work!

Please upgrade today!