UMA is a cloud-based solution, maintained by data centres that hold premier certifications such as ISO 27001 and SOC2.
For further details on compliance, please explore the AWS Security and AWS Compliance articles.
Where is UMA hosted?
UMA is hosted in AWS in a EU West data centre.
Are you ISO27001 certified?
Yes we are.
Does your information security and privacy policies align with industry standards?
AWS has certification for compliance with ISO/IEC 27001:2013, 27017:2015, and 27018:2014
Can you support SSO, and if so, which standards?
Yes, we support OAuth 2.0 and OpenID Connect
Where do you store my company's data?
Data is held in our UK AWS data centre. The only data being held is full names and email addresses.
How do you encrypt my company's data?
Our platform is encrypted using AES256 end to end. All data in transit and at rest is encrypted. We utilise the tools provided within AWS RDS.
v2.0 - 15/11/2023
This paper outlines UMA’s approach to security and compliance for UMA Cloud, UMA Products and UMA Services. This whitepaper focuses on security including details on organizational and technical controls regarding how UMA protects your data.
UMA is proud to announce that we are ISO 27001 accredited, demonstrating our commitment to the highest standards of information security management. This international standard specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS) within the context of the organisation. Our adherence to ISO 27001 standards ensures that we manage the security of assets such as financial information, intellectual property, employee details, and information entrusted to us by third parties with utmost diligence.
Before a member joins our team, UMA will verify an individual’s education and previous employment, and perform internal and external reference checks. Where local labour laws or statutory regulations permit, UMA may also conduct criminal, credit, immigration, and security checks. The extent of these background checks are dependent on the desired position.
All UMA employees undergo security training as part of the onboarding process and receive ongoing security training throughout their UMA working careers. During the onboarding phase, new employees agree to our Code of Conduct, which highlights our commitment to keeping customer information safe and secure. Depending on their job role, additional training on specific aspects of security may be required. For instance, the Information Security and Development team instructs new engineers on topics such as: secure coding practices, product design, and automated vulnerability testing tools. Engineers also attend technical presentations on security-related topics and receive a security newsletter that covers new threats, attack patterns, mitigation techniques, and more.
UMA regularly hosts internal conferences to raise awareness and drive innovation in security and data privacy which are open to all employees. Employees are regularly subjected to fake phishing emails to ensure the training received is understood and strengthens the awareness.
UMA employs security and privacy professionals who are part of our Platforms Engineer and Operations team. This team is tasked with maintaining the company’s systems from vulnerabilities, developing security review processes, building a security infrastructure, and implementing UMA’s security policies. UMA’s Security Team actively scans for security threats using commercial tools, penetration tests, quality assurance (QA) measures and software/platform security reviews.
UMA has a dedicated internal audit team that reviews compliance with security laws and regulations around the world.
To further bolster our commitment to security, UMA conducts annual penetration tests on our environment. These tests are designed to identify and fix vulnerabilities, ensuring the integrity, confidentiality, and availability of our customer's data. Moreover, following any major updates or significant changes to our systems, we conduct additional penetration testing. This approach helps us to immediately address any potential security issues introduced by new system functionalities or updates, thereby maintaining a robust security posture consistently.
UMA administrates a vulnerability management process that actively scans for security threats using a combination of commercially available and purpose-built in-house tools, intensive automated and manual penetration efforts, quality assurance processes, software security reviews, and external audits. The vulnerability management team (Security Team) is responsible for tracking and following up on vulnerabilities. Once a vulnerability requiring remediation has been identified, it is logged, prioritized according to severity, and assigned an owner.
UMA’s security monitoring system is focused on information gathered from internal network traffic on our Platform, employee actions on systems, and outside knowledge of vulnerabilities. Within each of our Region’s traffic is inspected for suspicious behaviour, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of tools and services available within Amazon AWS. Inbound security reports are regularly monitored, and changes are audited.
We have a rigorous incident management process for security events that may affect the confidentiality, integrity, or availability of systems or data. If an incident occurs, the security team logs and prioritizes it according to its severity. Events that directly impact customers are assigned the highest priority. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation.
In accordance with our commitment to protect your privacy and manage your data responsibly, we will retain the personal and operational data collected through our services only for as long as necessary to fulfil the purposes outlined in this agreement, or as required by applicable law. All data will be securely deleted from our systems every three years, unless a shorter retention period is applicable. Additionally, upon the termination of your contract with us, we will delete all your data in full, ensuring that no residual copies remain in our backups or storage systems beyond a period necessary for the deletion process. This policy is designed to ensure compliance with data protection regulations and to safeguard your information against unauthorized access or use.
To keep data private and secure, UMA logically isolates each customer’s data from that of other customers and users, even when it is stored on the same virtual host hosted in AWS. Only a small group of UMA employees have access to customer data. For UMA employees, access rights and levels are based on their job functions and role, using the concepts of least privilege and need-to-know to match access privileges and defined responsibilities. Requests for additional access follow a formal process that involves a request and approval from a data or system owner, manager, or other executives, as dictated by UMA's security policies. Approvals are managed by workflow tools that maintain audit records for all changes.
Within customer organisations, administrative roles and privileges for UMA Cloud are configured and controlled by the Project/Facilities owner. This means that individual team members can manage certain services or perform specific administrative functions related to that organisation only without gaining access to all settings and data.
The customer, as the data owner, is primarily responsible for responding to law enforcement data requests: however, like other technology companies, UMA may receive direct requests from government and courts around the world about how a person has used the company’s services. We take measures to protect customers' privacy and limit excessive requests while also meeting our legal obligations. Respect for the privacy and security of data you store with UMA remains our priority as we comply with these legal requests. When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and UMA policies. For us to comply, the request must be made in writing, signed by an authorized official of the requesting agency, and issued under an appropriate law.
UMA directly conducts virtually all data processing activities to provide our services. However, UMA may engage some third-party suppliers to provide services relating to UMA, UMA Vision, UMA Book, UMA Sense, UMA C-19 and UMA Air. Prior to onboarding third-party suppliers, UMA conducts an assessment of the security and privacy practices of third-party suppliers to ensure they provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide.
The protection of your data is the primary design consideration for all UMAs Infrastructure, products, and personnel operations. Data protection is more than just security, UMAs strong contractual commitments make sure you maintain control over your data and how it is processed, including the assurance that your data is not used for advertising or any purpose other than to deliver UMA Cloud Services to you.
Please click on one of the below cards to check out the firewall rules needed from your network devices to our servers.
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Gateway service
vision.meetuma.ai
443
HTTPS
Gateway service
*.archilogic.com
443
HTTPS
Maps
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-internal-uk.meetuma.ai
8084
TCP
MQTT service
uma-vision-logo.s3.eu-west-2.amazonaws.com/*
443
HTTPS
Branding service
book.meetuma.ai/static/media/*
443
HTTPS
Branding service
app.moki.com
443
HTTPS
Management service
*.moki-marbles.appspot.com
443
HTTPS
Management service
mcm-moki-marbles.moki.com
443
HTTPS
Management service
moki-router.appspot.com
443
HTTPS
Management service
*.pushy.me
443
HTTPS
Management service
commondatastorage.googleapis.com
443
HTTPS
Management service
storage.googleapis.com
443
HTTPS
Management service
gcm.googleapis.com
5228-5230
HTTPS
Management service
firebaselogging-pa.googleapis.com
443
HTTPS
Crash reporting service
crashlyticsreports-pa.googleapis.com
443
HTTPS
Crash reporting service
settings.crashlytics.com
443
HTTPS
Crash reporting service
firestore.googleapis.com
443
HTTPS
Crash reporting service
app-measurement.com
443
HTTPS
Crash reporting service
office.meetuma.ai
443
HTTPS
Application
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-internal-uk.meetuma.ai
8084
TCP
MQTT service
uma-vision-logo.s3.eu-west-2.amazonaws.com/*
443
HTTPS
Branding service
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-internal-uk.meetuma.ai
8084
TCP
MQTT service
uma-vision-logo.s3.eu-west-2.amazonaws.com/*
443
HTTPS
Branding service
visitor.meetuma.ai/static/media/*
443
HTTPS
Branding service
check-in.meetuma.ai
443
HTTPS
Application
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
count.meetuma.ai
443
HTTPS
Application
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-internal-uk.meetuma.ai
8084
TCP
MQTT service
uma-vision-logo.s3.eu-west-2.amazonaws.com/*
443
HTTPS
Branding service
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-internal-uk.meetuma.ai
8084
TCP
MQTT service
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-external.meetuma.ai
8883
TLS
MQTT service
uma-vision-gateway-service-prod.meetuma.ai
443
HTTPS
Management service
mqtt-external.meetuma.ai
8883
TLS
MQTT service
ssh.strato.de
22
TCP
Upgrade service
registry.npmjs.org
443
HTTPS
Upgrade service
mqtt-external.meetuma.ai
8883
TLS
MQTT service
Optional - Milesight remote management service for people counting sensors.
devicehub.meetuma.ai
22
TCP
Management service
devicehub.meetuma.ai
443
TCP
Management service
devicehub.meetuma.ai
3478
UDP
Management service
devicehub.meetuma.ai
3479
UDP
Management service
devicehub.meetuma.ai
6379
TCP
Management service
devicehub.meetuma.ai
8443
TCP
Management service
devicehub.meetuma.ai
10000-10100
TCP
Management service
devicehub.meetuma.ai
20000-20100
TCP
Management service
uma.irisyscloud.net
5000
TCP
Management service
mqtt-external.meetuma.ai
8883
TLS
MQTT service