Our Security

At Roger, we take data security very seriously and follow best cybersecurity protocols to ensure that our users' data is safe and secure. We have implemented the following measures to ensure the highest level of security:

MICROSOFT LOGIN AND AUTHENTICATION

We use Microsoft login to manage user sessions and authentication tokens. When users log into Roger for the first time, they are prompted to log in via a Microsoft OAuth screen governed by Microsoft. At this time, any permissions for user data are explicitly requested. The authentication token that Roger uses to log users into the product is sourced from Microsoft, so any data access given to Roger is granted by the user and the user's organization.

VERIFIED MICROSOFT CLOUD PARTNER

We are a verified member of the Microsoft Cloud Partner Program, and we have completed all necessary processes to ensure that our product meets Microsoft's stringent security requirements. This is reflected by our Microsoft verified badge on the Microsoft OAuth screen on first login.

SECURE GOOGLE CLOUD SERVER

We store any user data on a secure Google Cloud server and follow standard Google policy to ensure data security. Our servers are regularly monitored and maintained to ensure that they are up-to-date with the latest security patches and protocols.

LIMITED ACCESS TO USER DATA

Internal Roger employees do not have access to the data of Roger users; access to this is only available when logged in with the appropriate Microsoft user token.

NO SHARING OR SELLING OF USER DATA

We do not share or sell user data to any third-party vendors or entities.

In summary, we take all necessary measures to ensure that our product is secure and that our users' data is safe. We understand the importance of data security, especially in the construction industry, and we strive to exceed industry standards to provide our users with peace of mind.

Questions? Reach out to Elijah Zenger | elijah@tryroger.com