Income Mavericks is a product of Techanisms.
Techanisms' goal is to help marketing professionals and businesses reach and surpass their benchmarks for success.
We believe in enhancing automation, improving communication, and boosting scalability in a consumer-friendly way, and we consistently provide future-embracing updates that exemplify these priorities.
Our AI-powered all-in-one sales, marketing, and customer relationship management (CRM) platform, Income Mavericks, offers numerous features that are essential to business owners and marketers. This expansive software solution provides limitless opportunities for our customers to set lofty sales goals and achieve them while being supported by our team of experts.
Income Mavericks is built on a strong foundation through a licensed technology partner with an international footprint that has been operating since 2018. This partner is responsible for the bulk of the security and privacy protocols outlined in this document. They are included when referring to Income Mavericks below.
The security and infrastructure of Income Mavericks are fully managed by our licensed technology partner. Techanisms does not handle security, infrastructure, or data protection directly but relies on our partner’s robust systems and compliance measures.
This document provides an overview of the security and compliance measures implemented by our licensed technology partner.
The security framework for Income Mavericks follows best practices for the SaaS industry as implemented by our licensed technology partner. The key objectives include:
Security controls for Income Mavericks are managed by our licensed technology partner. Below is a subset of the most frequently asked questions about security and infrastructure controls.
Techanisms does not host any product systems or data. Income Mavericks operates on a licensed technology partner’s platform, which relies on industry-leading cloud providers such as Google Cloud Platform Services and Amazon Web Services (AWS). The product infrastructure resides in the United States, and security is governed by our licensed technology partner’s policies and protocols.
Google provides a monthly uptime percentage of at least 99.5%. More details on Google's compliance measures can be found in their publicly available Compliance Resource Center.
AWS guarantees 99.95% to 100% service reliability, ensuring redundancy across all power, network, and HVAC services. AWS’s compliance documentation and audit reports are publicly available at the AWS Cloud Compliance Page and AWS Artifacts Portal.
The Income Mavericks product infrastructure enforces multiple layers of filtering and inspection across all connections through our licensed technology partner’s web application, logical firewalls, and security groups. Network-level access control lists prevent unauthorized access to internal product infrastructure and resources. By default, firewalls are configured to deny all network connections unless explicitly authorized.
The licensed technology partner maintains a highly automated environment that expands capacity as needed. Server configurations are embedded in images and configuration files used when new containers are provisioned. Each container includes its own hardened configuration, with changes managed through a controlled change pipeline.
Server instances are tightly controlled from provisioning through deprovisioning, ensuring that any deviations from configuration baselines are detected and reverted within a predefined cadence. If a production server drifts from its baseline configuration, it is overwritten within 30 minutes. Patch management is handled through automated configuration tools, or by removing non-compliant server instances.
Actions and events within Income Mavericks are logged comprehensively by our licensed technology partner. Logs are indexed and stored in a central logging solution hosted in their cloud environment. Security-related logs are retained to facilitate investigation and response activities.
Automated monitoring, alerting, and response capabilities are managed entirely by the licensed technology partner to address potential security issues.
Security at the application level, including firewall protections, intrusion detection, and vulnerability management, is entirely handled by our licensed technology partner. Income Mavericks operates on this platform, inheriting all security measures provided by our partner.
All data security and encryption protocols, including encryption in transit and at rest, are managed by our licensed technology partner. Data stored in Income Mavericks is encrypted at rest using AES-256 encryption, and user passwords follow industry best practices.
Encryption keys and transport layer security (TLS) certificates are managed entirely by the licensed technology partner. Income Mavericks does not provide custom encryption key management at this time.
Techanisms does not manage infrastructure redundancy or disaster recovery. These functions are the responsibility of our licensed technology partner, who ensures backup systems and recovery solutions are in place.
Income Mavericks customers can recover certain deleted data within 30 days through built-in recovery options. However, all backup policies, failover systems, and disaster recovery procedures are managed by the licensed technology partner.
Income Mavericks does not sell personal data to third parties. Customer data is managed by our licensed technology partner, following GDPR-aligned privacy principles. Techanisms does not store, manage, or have access to backend infrastructure or security-related operations.
For further details on security, compliance, and data protection practices, please refer to our licensed technology partner’s Terms of Service and Privacy Policy.
This document is provided as a resource for customers of Techanisms and Income Mavericks and is subject to change based on updates from our licensed technology partner. Techanisms provides front-end platform management and customer interface, while our licensed technology partner is responsible for core backend operations, security, and infrastructure management.