The phrase “web-based” can be confusing to some. What does web-based actually mean? What are the benefits? Is my data safe? We’ll try to take some of the mystery out of it below.
Web-based means that KidCheck’s children’s check-in system runs over the internet. You use a computer with an internet connection as the check-in station. It does not need to have a database file specifically associated with the computer and the solution runs on your web browser. See this link for system requirements.
- Upgrades are free and automatic. There’s nothing you need to do to maintain your system. New features are implemented on our server and automatically delivered to your computers.
- Provides the ability for multiple connected stations.
- Allows you to log in to your check-in system from home or other sites.
- Plus, KidCheck is different in that it is a global database. That means parents set up their own accounts and once the account is set up, parents can easily check-in to any facility (i.e. church, daycare, school, gym) using KidCheck with that account. The system will automatically find them based on their unique phone number.
- No expensive or specialized computer systems to buy. Simply download the KidCheck client is both Windows and Mac compatible.
Yes, your data is very secure. In fact at KidCheck we pride ourselves on our extreme measures regarding data security.
- Data is always transmitted securely using the latest data encryption technologies which provides protection for potential hackers.
- Your login credentials are encrypted.
- KidCheck servers are housed in a certified secure data center facility protected 24/7.
- We utilize bank-level security standards such as encryption, auditing, logging, backups and safe-guarding data.
- All KidCheck employees undergo state and federal background checks.
There’s a myth that web-based data is less secure than data stored locally. That’s couldn’t be more false. Not only is your data secure as noted above, but locally stored data also has the threat of location security. If someone was intent on acquiring your secure data, they could come into your organization looking like they belong and if a PC is left unattended for even a short period of time, they could download the data onto a thumb drive or steal printed reports off an abandoned desk.