Instruction Manual

Security and Data Storage Chapter 1. General Information
IM8000 CheckPoint™ User Manual 1.5
Security and Data Storage
Each CheckPoint™ customer’s data is stored in a state-of-the-art data center in dedicated and partitioned
databases, exclusive to each customer. Additionally, when viewing the CheckPoint™ application, high-
security, industry-standard encryption is utilized.
The hosting center is a SAS 70 Type II compliant facility. SAS 70 is designated by the U.S. Securities and
Exchange Commission (SEC) as an acceptable method to obtain assurance of a service organization’s
internal controls without conducting separate assessments. Successful completion of the SAS 70 Type II
examination indicates that the processes, procedures, and controls have been formally evaluated and
tested by an independent auditing firm.
A service auditor’s examination performed in accordance with SAS No. 70 (SAS 70 audit) is widely
recognized. It represents that a service organization has been through an in-depth audit of their control
objectives and control activities, which often include controls over information technology and related
processes. A Type II report not only includes the service organization’s description of controls but also
includes detailed testing of the design and operating effectiveness.
The hosting center environment is built with state-of-the-art equipment, technology investments and
operational expertise. There is an established disaster recovery program with redundancy and failover to
protect the information stored in the system.
Requirements and Network Capacity
Access Requirements
Each computer or mobile device that wants to connect to CheckPoint™ must have access to the Internet.
All Welding Power Sources also need to have access to the Internet to report information back to the
CheckPoint™ data center. Every Welding Power Source has a unique 16-character serial number.
This identification serial number is saved during the registration process and sent to the CheckPoint™ data
center with each welding data packet. When data arrives at the CheckPoint™ data center, the identification
serial number is used to save the data into your customer database.
See Chapter 2 for details on preparing for CheckPoint™.
Accessing Data in the CheckPoint™ Data Center
Each customer has a separate partition in the database for their data. You control access to your data with
usernames and passwords that are created by your CheckPoint™ Administrator. The administrator
provides access to the data, as needed, for those users who need to access the data and generate reports.
See page 4.4 for details on User Management.