Skip to main content
All CollectionsSecurity
Security Help Documentation
Security Help Documentation
Updated over 4 months ago

Welcome to the Security Help Documentation of RentalTide! This guide is designed to help you understand and implement the best security practices within our platform, ensuring that your data and transactions remain safe and secure. Whether you're an administrator managing user permissions or a user safeguarding your account, this documentation provides comprehensive information to maintain a secure environment.


Introduction

At RentalTide, security is a top priority. We are committed to protecting your data, ensuring secure transactions, and providing a safe environment for all users. This documentation outlines the security measures in place, offers best practices for maintaining account security, and provides guidance on managing permissions and responding to security incidents.


Key Security Features

User Authentication

User Authentication is the first line of defense against unauthorized access. RentalTide employs robust authentication mechanisms to verify user identities.

  • Strong Password Policies: Enforces the creation of complex passwords that include a mix of letters, numbers, and special characters.

  • Two-Factor Authentication (2FA): Adds an extra layer of security by requiring a second form of verification during login.

  • OAuth Integration: Supports secure authentication through trusted third-party providers.

Permissions and Access Control

Our Permissions and Access Control system ensures that users have access only to the features and data necessary for their roles.

  • Role-Based Access Control (RBAC): Assigns permissions based on user roles (e.g., Admin, Manager, Staff).

  • Granular Permissions: Allows precise control over actions users can perform (e.g., profile_edit, stores_delete).

  • Permission Inheritance: Simplifies management by allowing roles to inherit permissions from other roles.

Data Encryption

Data Encryption safeguards your data both at rest and in transit.

  • Encryption at Rest: All sensitive data stored in our databases is encrypted using industry-standard encryption algorithms.

  • Encryption in Transit: Data exchanged between your device and our servers is protected using TLS (Transport Layer Security) protocols.

  • End-to-End Encryption: Ensures that only authorized parties can access the data, preventing interception by unauthorized entities.

Secure Payment Processing

We prioritize the security of your financial transactions through secure payment processing methods.

  • PCI DSS Compliance: Adheres to the Payment Card Industry Data Security Standard to protect cardholder data.

  • Tokenization: Replaces sensitive payment information with unique tokens, minimizing the risk of data breaches.

  • Secure Payment Gateways: Integrates with trusted payment providers like Stripe to ensure secure transaction processing.

Account Management

Effective Account Management practices help maintain the integrity and security of user accounts.

  • Account Lockout Policies: Prevents brute-force attacks by locking accounts after a certain number of failed login attempts.

  • Session Management: Ensures that user sessions are securely managed and terminated after periods of inactivity.

  • Account Recovery: Provides secure methods for recovering access to accounts in case of forgotten passwords or lost authentication devices.

Activity Logs and Monitoring

Comprehensive Activity Logs and Monitoring enable proactive security measures and incident response.

  • Audit Trails: Records all user activities, changes to permissions, and access to sensitive data.

  • Real-Time Monitoring: Continuously monitors for suspicious activities and potential security threats.

  • Alerts and Notifications: Notifies administrators of unusual activities or security breaches for immediate action.

Compliance with Standards

RentalTide complies with various industry standards to ensure data protection and privacy.

  • General Data Protection Regulation (GDPR): Protects the personal data and privacy of EU citizens.

  • California Consumer Privacy Act (CCPA): Enhances privacy rights and consumer protection for residents of California.

  • Health Insurance Portability and Accountability Act (HIPAA): (If applicable) Protects sensitive patient health information.


Best Practices

Adhering to security best practices is essential for maintaining a secure environment. Below are recommended practices for both administrators and users.

Creating Strong Passwords

  • Length and Complexity: Use passwords that are at least 12 characters long, incorporating uppercase and lowercase letters, numbers, and special characters.

  • Avoid Common Words: Refrain from using easily guessable information such as birthdays, names, or common phrases.

  • Unique Passwords: Use a different password for each account to prevent multiple breaches from compromising all your accounts.

Enabling Two-Factor Authentication (2FA)

  • Setup 2FA: Enable 2FA in your account settings to add an extra layer of security.

  • Use Authenticator Apps: Prefer using authenticator apps (e.g., Google Authenticator, Authy) over SMS-based 2FA for enhanced security.

  • Backup Codes: Store backup codes in a secure location to regain access if you lose your 2FA device.

Managing Permissions

  • Principle of Least Privilege: Assign users only the permissions they need to perform their roles.

  • Regular Reviews: Periodically review and update user permissions to reflect changes in roles or responsibilities.

  • Temporary Access: Grant temporary permissions for specific tasks and revoke them once the task is completed.

Regularly Reviewing Access Logs

  • Monitor Activity: Regularly check activity logs to identify any unauthorized or suspicious activities.

  • Audit Trails: Utilize audit trails to track changes to permissions, data access, and user activities.

  • Respond to Alerts: Act promptly on any security alerts or unusual activities detected in the logs.

Keeping Software Updated

  • Automatic Updates: Enable automatic updates for all software to ensure you receive the latest security patches.

  • Monitor Releases: Stay informed about new releases and updates from RentalTide to maintain optimal security.

  • Compatibility Checks: Before updating, ensure that new versions are compatible with your existing integrations and workflows.


Managing Permissions

Proper management of permissions is crucial for maintaining security and ensuring that users have appropriate access.

Understanding Roles and Permissions

Roles define a set of permissions assigned to users based on their responsibilities. Permissions determine what actions users can perform within the system.

  • Common Roles:

    • Admin: Full access to all features and settings.

    • Manager: Access to management functionalities but limited administrative controls.

    • Staff: Basic access to perform daily tasks without access to sensitive settings.

  • Example Permissions:

    • profile_access: Access to the Profile Page.

    • profile_edit: Ability to edit profile information.

    • stores_add: Permission to add new store locations.

    • stores_edit: Permission to edit existing store locations.

    • stores_delete: Permission to delete store locations.

    • stores_view_settings: Access to store-specific settings.

    • stores_view_stripe_connect: Manage Stripe Connect integrations.

Assigning and Revoking Permissions

Assigning Permissions:

  1. Navigate to User Management:

    • Go to the User Management section in your admin dashboard.

  2. Select User:

    • Choose the user you want to assign permissions to.

  3. Assign Role:

    • Select the appropriate role (e.g., Admin, Manager, Staff) that encompasses the required permissions.

  4. Custom Permissions:

    • For more granular control, manually select specific permissions beyond the predefined roles.

  5. Save Changes:

    • Confirm and save the updated permissions for the user.

Revoking Permissions:

  1. Access User Profile:

    • Navigate to the User Management section and select the user.

  2. Modify Permissions:

    • Deselect the permissions you wish to revoke or change the user's role to one with fewer permissions.

  3. Save Updates:

    • Confirm and save the changes to update the user's access rights.

Best Practices:

  • Regular Audits: Conduct periodic audits of user permissions to ensure they align with current roles and responsibilities.

  • Temporary Access: Provide temporary permissions for specific projects or tasks and revoke them once completed.

  • Documentation: Maintain documentation of permission assignments for accountability and reference.


Data Protection

Protecting your data is paramount. RentalTide implements comprehensive measures to ensure your data remains secure.

Data Storage and Encryption

  • Secure Databases: All data is stored in secure databases with restricted access controls.

  • Encryption: Data is encrypted both at rest and in transit using industry-standard encryption protocols (e.g., AES-256 for data at rest, TLS 1.2+ for data in transit).

  • Access Controls: Only authorized personnel have access to sensitive data, minimizing the risk of internal breaches.

Data Backup Policies

  • Regular Backups: Automated backups are performed daily to ensure data can be restored in case of loss or corruption.

  • Redundancy: Backups are stored in multiple locations to prevent data loss from hardware failures or disasters.

  • Recovery Testing: Regular testing of backup restoration processes ensures data integrity and availability during emergencies.

Data Retention Policies

  • Retention Periods: Data is retained based on legal requirements and business needs, with clear policies outlining retention durations.

  • Data Deletion: Upon request or when data is no longer needed, it is securely deleted from all storage systems.

  • Compliance: Adheres to data protection regulations (e.g., GDPR, CCPA) regarding data retention and deletion practices.


Secure Payment Processing

Ensuring the security of your financial transactions is a top priority. RentalTide employs secure payment processing methods to protect your financial data.

Transaction Security

  • SSL/TLS Encryption: All transaction data is encrypted using SSL/TLS protocols to prevent interception by unauthorized parties.

  • Tokenization: Sensitive payment information is tokenized, replacing it with unique identifiers that are useless if intercepted.

  • Fraud Detection: Advanced fraud detection mechanisms monitor transactions for suspicious activities, preventing fraudulent charges.

Stripe Integration Security

RentalTide integrates with Stripe, a trusted payment processor, to manage payment transactions securely.

  • Stripe PCI Compliance: Stripe complies with the Payment Card Industry Data Security Standard (PCI DSS), ensuring the highest level of security for payment processing.

  • Secure API Integration: All communications between RentalTide and Stripe are secured via encrypted APIs, safeguarding data exchange.

  • Webhooks Verification: Stripe webhooks are verified to ensure that event notifications are genuine and untampered.

  • Token-Based Transactions: Payment tokens are used instead of storing sensitive card information, reducing the risk of data breaches.


Account Management

Effective Account Management practices help maintain the security and integrity of user accounts.

Account Lockout Policies

  • Failed Login Attempts: Accounts are locked after a specified number of consecutive failed login attempts to prevent brute-force attacks.

  • Lockout Duration: Accounts remain locked for a predetermined period or until manually unlocked by an administrator.

  • Notification: Users are notified via email when their accounts are locked due to failed login attempts.

Session Management

  • Session Timeouts: User sessions automatically expire after a period of inactivity to reduce the risk of unauthorized access.

  • Secure Cookies: Session cookies are secured with attributes like HttpOnly and Secure to prevent cross-site scripting (XSS) and man-in-the-middle (MITM) attacks.

  • Session Termination: Users can manually terminate active sessions from their account settings, ensuring they can revoke access when needed.

Account Recovery

  • Secure Recovery Processes: Account recovery processes, such as password resets, require multiple forms of verification to ensure only authorized users can regain access.

  • Recovery Emails: Password reset links are sent to the user's registered email address, which should be kept secure and up-to-date.

  • Recovery Questions: If implemented, recovery questions are designed to be difficult for others to guess, enhancing security.


Activity Logs and Monitoring

Monitoring user activities and maintaining detailed logs are essential for detecting and responding to security incidents.

Audit Trails

  • Comprehensive Logging: All critical actions, including login attempts, permission changes, data access, and transaction processing, are logged.

  • Immutable Logs: Logs are stored in a manner that prevents tampering or unauthorized modifications.

  • Accessible Reports: Administrators can generate reports from audit trails to review user activities and identify potential security issues.

Real-Time Monitoring

  • Continuous Surveillance: The system continuously monitors for unusual activities, such as multiple failed login attempts or access from unfamiliar IP addresses.

  • Automated Alerts: Real-time alerts notify administrators of potential security threats, enabling swift response and mitigation.

  • Behavioral Analysis: Advanced algorithms analyze user behavior to detect anomalies that may indicate compromised accounts or insider threats.

Alerts and Notifications

  • Immediate Alerts: Receive instant notifications for critical security events, such as unauthorized access attempts or data breaches.

  • Customizable Notifications: Administrators can configure which events trigger alerts, ensuring relevance and reducing noise.

  • Incident Response Integration: Alerts are integrated with incident response workflows, facilitating coordinated and effective responses to security incidents.


Compliance with Standards

RentalTide adheres to various industry standards to ensure data protection and regulatory compliance.

General Data Protection Regulation (GDPR)

  • Data Privacy: Ensures the protection of personal data and privacy of EU citizens.

  • User Rights: Provides users with rights to access, rectify, and erase their personal data.

  • Data Processing Agreements: Maintains agreements with data processors to uphold GDPR standards.

California Consumer Privacy Act (CCPA)

  • Consumer Rights: Grants California residents rights to know, delete, and opt-out of the sale of their personal information.

  • Transparency: Maintains clear and transparent data collection and usage policies.

  • Compliance Audits: Regularly conducts audits to ensure ongoing compliance with CCPA requirements.

Payment Card Industry Data Security Standard (PCI DSS)

  • Secure Handling of Payment Data: Complies with PCI DSS to protect cardholder data during storage, processing, and transmission.

  • Regular Assessments: Conducts regular security assessments to maintain PCI DSS compliance.

  • Tokenization and Encryption: Utilizes tokenization and encryption to secure payment information.


Best Practices

Implementing best practices enhances the overall security posture and reduces the risk of breaches.

Creating Strong Passwords

  • Length and Complexity: Use passwords that are at least 12 characters long, combining uppercase and lowercase letters, numbers, and special characters.

  • Avoid Predictable Patterns: Do not use easily guessable information such as birthdays, names, or common words.

  • Unique Passwords: Use a unique password for each account to prevent cascading breaches.

Enabling Two-Factor Authentication (2FA)

  • Activate 2FA: Enable 2FA in your account settings to add an extra layer of security.

  • Use Authenticator Apps: Prefer using authenticator apps (e.g., Google Authenticator, Authy) over SMS-based 2FA for enhanced security.

  • Backup Codes: Store backup codes securely in case you lose access to your 2FA device.

Managing Permissions

  • Least Privilege Principle: Assign users only the permissions necessary for their roles to minimize potential security risks.

  • Regular Reviews: Periodically review and adjust permissions to reflect changes in roles or responsibilities.

  • Temporary Access: Grant temporary permissions for specific tasks and revoke them once the task is completed.

Regularly Reviewing Access Logs

  • Monitor Activities: Regularly inspect access logs to detect any unauthorized or suspicious activities.

  • Audit Trails: Utilize audit trails to track changes to permissions, data access, and user actions.

  • Respond to Alerts: Act promptly on security alerts to mitigate potential threats.

Keeping Software Updated

  • Automatic Updates: Enable automatic updates for all software components to ensure you receive the latest security patches.

  • Monitor Releases: Stay informed about new releases and updates from RentalTide to maintain optimal security.

  • Compatibility Checks: Before updating, verify that new versions are compatible with your existing integrations and workflows.


Managing Permissions

Properly managing permissions ensures that users have appropriate access levels, enhancing security and operational efficiency.

Understanding Roles and Permissions

Roles are predefined sets of permissions assigned to users based on their responsibilities within the organization.

  • Common Roles:

    • Admin: Full access to all features and settings, including user management and system configurations.

    • Manager: Access to management functionalities, such as overseeing store operations and viewing reports.

    • Staff: Basic access to perform daily tasks without access to sensitive settings or data.

Permissions dictate what actions users can perform within the system.

  • Examples of Permissions:

    • profile_access: Grants access to view the Profile Page.

    • profile_edit: Allows users to edit their profile information.

    • stores_add: Enables users to add new store locations.

    • stores_edit: Permits users to edit existing store details.

    • stores_delete: Allows users to delete store locations.

    • stores_view_settings: Grants access to view and manage store-specific settings.

    • stores_view_stripe_connect: Enables users to manage Stripe Connect integrations for stores.

    • billing_view: Grants access to view billing statements and manage payment information.

    • billing_edit: Allows users to update payment methods and manage billing settings.

Assigning and Revoking Permissions

Assigning Permissions:

  1. Navigate to User Management:

    • Access the User Management section from the admin dashboard.

  2. Select the User:

    • Choose the user you wish to assign permissions to from the user list.

  3. Assign Role or Custom Permissions:

    • Role-Based Assignment: Select a predefined role (e.g., Admin, Manager) that includes the necessary permissions.

    • Custom Assignment: Manually select specific permissions to tailor access according to the user's responsibilities.

  4. Save Changes:

    • Confirm and save the updated permissions for the user.

Revoking Permissions:

  1. Access User Profile:

    • Go to the User Management section and select the user whose permissions you wish to revoke.

  2. Modify Permissions:

    • Deselect the permissions you want to remove or change the user's role to one with fewer permissions.

  3. Save Updates:

    • Confirm and save the changes to update the user's access rights.

Best Practices:

  • Least Privilege Principle: Always assign the minimum necessary permissions required for users to perform their roles effectively.

  • Regular Audits: Conduct periodic reviews of user permissions to ensure they remain appropriate as roles and responsibilities evolve.

  • Temporary Permissions: Grant temporary permissions for specific tasks and revoke them once the tasks are completed to minimize security risks.


Data Protection

Protecting your data is essential for maintaining trust and compliance with regulatory standards. RentalTide implements robust data protection measures to ensure the confidentiality, integrity, and availability of your data.

Data Storage and Encryption

  • Secure Storage Solutions: All data is stored in secure, encrypted databases with strict access controls to prevent unauthorized access.

  • Encryption Standards:

    • At Rest: Data stored in databases is encrypted using advanced encryption standards (e.g., AES-256).

    • In Transit: Data transmitted between your device and our servers is protected using TLS (Transport Layer Security) protocols.

  • Access Controls: Only authorized personnel have access to sensitive data, ensuring that data access is limited to those who need it for their roles.

Data Backup Policies

  • Regular Backups: Automated backups are performed daily to ensure data can be restored in case of accidental loss or system failures.

  • Redundancy: Backups are stored in multiple geographic locations to protect against data loss from natural disasters or hardware failures.

  • Secure Backup Storage: Backup data is encrypted and stored securely, adhering to the same security standards as primary data storage.

  • Disaster Recovery: Comprehensive disaster recovery plans are in place to restore data and services promptly in the event of a major incident.

Data Retention Policies

  • Retention Schedules: Data is retained based on legal requirements, industry standards, and business needs.

  • Data Deletion: When data is no longer required, it is securely deleted from all storage systems to prevent unauthorized access.

  • Compliance: Our data retention policies comply with regulations such as GDPR and CCPA, ensuring that personal data is handled responsibly and lawfully.


Secure Payment Processing

Ensuring the security of your financial transactions is a top priority. RentalTide employs industry-leading practices to protect your payment data and facilitate secure transactions.

Transaction Security

  • SSL/TLS Encryption: All payment data transmitted between your browser and our servers is encrypted using SSL/TLS protocols to prevent interception by malicious actors.

  • Tokenization: Sensitive payment information, such as credit card numbers, is replaced with unique tokens, minimizing the risk of data breaches.

  • Fraud Detection: Advanced algorithms monitor transactions in real-time to identify and prevent fraudulent activities.

  • Secure Payment Gateways: Integrates with trusted payment providers like Stripe to ensure secure transaction processing.

Stripe Integration Security

RentalTide leverages Stripe for secure and efficient payment processing. Our integration with Stripe adheres to the highest security standards to protect your financial information.

  • PCI DSS Compliance: Stripe complies with the Payment Card Industry Data Security Standard (PCI DSS), ensuring that all payment data is handled securely.

  • Secure API Integration: All interactions between RentalTide and Stripe occur over secure, encrypted APIs, safeguarding data exchange.

  • Webhooks Verification: Stripe webhooks are verified to ensure that event notifications are legitimate and untampered.

  • Token-Based Transactions: Payment tokens are used instead of storing sensitive card information, reducing the risk of data breaches.

  • Regular Security Audits: Both RentalTide and Stripe undergo regular security audits to maintain compliance with security standards and address potential vulnerabilities.


Account Management

Effective Account Management practices are essential for maintaining the security and integrity of user accounts within RentalTide.

Account Lockout Policies

  • Failed Login Attempts: Accounts are locked after a predefined number of consecutive failed login attempts to prevent brute-force attacks.

  • Lockout Duration: Locked accounts remain inaccessible for a specified duration or until manually unlocked by an administrator.

  • User Notifications: Users receive email notifications when their accounts are locked due to failed login attempts, prompting them to secure their accounts.

Session Management

  • Session Timeouts: User sessions automatically expire after a period of inactivity, reducing the risk of unauthorized access from unattended devices.

  • Secure Cookies: Session cookies are secured with attributes like HttpOnly and Secure to prevent cross-site scripting (XSS) and man-in-the-middle (MITM) attacks.

  • Session Termination: Users can manually terminate active sessions from their account settings, providing control over their account access.

Account Recovery

  • Secure Recovery Processes: Account recovery processes, such as password resets, require multiple forms of verification to ensure that only authorized users can regain access.

  • Recovery Emails: Password reset links are sent to the user's registered email address, which should be kept secure and up-to-date.

  • Recovery Questions: If implemented, recovery questions are designed to be challenging for others to guess, enhancing account security.


Activity Logs and Monitoring

Comprehensive Activity Logs and Monitoring enable proactive security measures and effective incident response.

Audit Trails

  • Detailed Logging: All critical actions, including logins, permission changes, data access, and transaction processing, are meticulously logged.

  • Immutable Logs: Logs are stored in a manner that prevents tampering or unauthorized modifications, ensuring their integrity.

  • Accessible Reports: Administrators can generate and review audit reports to monitor user activities and identify potential security issues.

Real-Time Monitoring

  • Continuous Surveillance: The system continuously monitors user activities and system performance to detect anomalies and potential threats.

  • Automated Alerts: Real-time alerts notify administrators of suspicious activities, such as multiple failed login attempts or unauthorized data access.

  • Behavioral Analysis: Advanced algorithms analyze user behavior patterns to identify deviations that may indicate compromised accounts or insider threats.

Alerts and Notifications

  • Immediate Notifications: Receive instant notifications for critical security events, enabling swift action to mitigate risks.

  • Customizable Alert Settings: Administrators can configure which events trigger alerts, ensuring relevance and reducing unnecessary notifications.

  • Integration with Incident Response: Alerts are integrated with incident response workflows, facilitating coordinated and effective responses to security incidents.


Compliance with Standards

RentalTide adheres to various industry standards and regulations to ensure data protection, privacy, and operational integrity.

General Data Protection Regulation (GDPR)

  • Data Privacy: Ensures the protection of personal data and privacy of EU citizens.

  • User Rights: Provides users with rights to access, rectify, erase, and restrict the processing of their personal data.

  • Data Processing Agreements: Maintains agreements with data processors to uphold GDPR standards and responsibilities.

California Consumer Privacy Act (CCPA)

  • Consumer Rights: Grants California residents rights to know, delete, and opt-out of the sale of their personal information.

  • Transparency: Maintains clear and transparent data collection, usage, and sharing policies.

  • Compliance Audits: Regularly conducts audits to ensure ongoing compliance with CCPA requirements.

Payment Card Industry Data Security Standard (PCI DSS)

  • Secure Handling of Payment Data: Complies with PCI DSS to protect cardholder data during storage, processing, and transmission.

  • Regular Assessments: Conducts regular security assessments and vulnerability scans to maintain PCI DSS compliance.

  • Tokenization and Encryption: Utilizes tokenization and encryption to secure payment information and minimize exposure to sensitive data.

Health Insurance Portability and Accountability Act (HIPAA) (If Applicable)

  • Protected Health Information (PHI): Ensures the confidentiality, integrity, and availability of PHI.

  • Security Measures: Implements administrative, physical, and technical safeguards to protect PHI.

  • Breach Notification: Complies with HIPAA breach notification requirements, informing affected individuals and authorities in case of data breaches.


Best Practices

Adhering to security best practices enhances the overall security posture and reduces the risk of breaches. Below are recommended practices for both administrators and users.

Creating Strong Passwords

  • Length and Complexity: Use passwords that are at least 12 characters long, incorporating a mix of uppercase and lowercase letters, numbers, and special characters.

  • Avoid Common Words: Do not use easily guessable information such as birthdays, names, or common phrases.

  • Unique Passwords: Use a unique password for each account to prevent multiple breaches from compromising all your accounts.

Enabling Two-Factor Authentication (2FA)

  • Activate 2FA: Enable 2FA in your account settings to add an extra layer of security.

  • Use Authenticator Apps: Prefer using authenticator apps (e.g., Google Authenticator, Authy) over SMS-based 2FA for enhanced security.

  • Backup Codes: Store backup codes securely in case you lose access to your 2FA device.

Managing Permissions

  • Least Privilege Principle: Assign users only the permissions necessary for their roles to minimize potential security risks.

  • Regular Reviews: Periodically review and update user permissions to reflect changes in roles or responsibilities.

  • Temporary Access: Grant temporary permissions for specific tasks and revoke them once the tasks are completed to minimize security risks.

Regularly Reviewing Access Logs

  • Monitor Activities: Regularly inspect access logs to detect any unauthorized or suspicious activities.

  • Audit Trails: Utilize audit trails to track changes to permissions, data access, and user activities.

  • Respond to Alerts: Act promptly on security alerts to mitigate potential threats.

Keeping Software Updated

  • Automatic Updates: Enable automatic updates for all software components to ensure you receive the latest security patches.

  • Monitor Releases: Stay informed about new releases and updates from RentalTide to maintain optimal security.

  • Compatibility Checks: Before updating, verify that new versions are compatible with your existing integrations and workflows.


Managing Permissions

Proper management of permissions is crucial for maintaining security and ensuring that users have appropriate access levels.

Understanding Roles and Permissions

Roles define a set of permissions assigned to users based on their responsibilities within the organization. Permissions determine what actions users can perform within the system.

  • Common Roles:

    • Admin: Full access to all features and settings, including user management and system configurations.

    • Manager: Access to management functionalities, such as overseeing store operations and viewing reports.

    • Staff: Basic access to perform daily tasks without access to sensitive settings or data.

Example Permissions:

  • profile_access: Grants access to the Profile Page.

  • profile_edit: Allows users to edit profile information.

  • stores_add: Enables users to add new store locations.

  • stores_edit: Permits users to edit existing store details.

  • stores_delete: Allows users to delete store locations.

  • stores_view_settings: Grants access to view and manage store-specific settings.

  • stores_view_stripe_connect: Enables users to manage Stripe Connect integrations for stores.

  • billing_view: Grants access to view billing statements and manage payment information.

  • billing_edit: Allows users to update payment methods and manage billing settings.

Assigning and Revoking Permissions

Assigning Permissions:

  1. Navigate to User Management:

    • Access the User Management section from the admin dashboard.

  2. Select the User:

    • Choose the user you wish to assign permissions to from the user list.

  3. Assign Role or Custom Permissions:

    • Role-Based Assignment: Select a predefined role (e.g., Admin, Manager) that includes the necessary permissions.

    • Custom Assignment: Manually select specific permissions to tailor access according to the user's responsibilities.

  4. Save Changes:

    • Confirm and save the updated permissions for the user.

Revoking Permissions:

  1. Access User Profile:

    • Go to the User Management section and select the user whose permissions you wish to revoke.

  2. Modify Permissions:

    • Deselect the permissions you want to remove or change the user's role to one with fewer permissions.

  3. Save Updates:

    • Confirm and save the changes to update the user's access rights.

Best Practices:

  • Least Privilege Principle: Always assign the minimum necessary permissions required for users to perform their roles effectively.

  • Regular Audits: Conduct periodic reviews of user permissions to ensure they remain appropriate as roles and responsibilities evolve.

  • Temporary Permissions: Grant temporary permissions for specific tasks and revoke them once the tasks are completed to minimize security risks.


Data Protection

Protecting your data is essential for maintaining trust and compliance with regulatory standards. RentalTide implements robust data protection measures to ensure the confidentiality, integrity, and availability of your data.

Data Storage and Encryption

  • Secure Storage Solutions: All data is stored in secure, encrypted databases with strict access controls to prevent unauthorized access.

  • Encryption Standards:

    • At Rest: Data stored in databases is encrypted using advanced encryption standards (e.g., AES-256).

    • In Transit: Data transmitted between your device and our servers is protected using TLS (Transport Layer Security) protocols.

  • Access Controls: Only authorized personnel have access to sensitive data, ensuring that data access is limited to those who need it for their roles.

Data Backup Policies

  • Regular Backups: Automated backups are performed daily to ensure data can be restored in case of accidental loss or system failures.

  • Redundancy: Backups are stored in multiple geographic locations to protect against data loss from natural disasters or hardware failures.

  • Secure Backup Storage: Backup data is encrypted and stored securely, adhering to the same security standards as primary data storage.

  • Disaster Recovery: Comprehensive disaster recovery plans are in place to restore data and services promptly in the event of a major incident.

Data Retention Policies

  • Retention Schedules: Data is retained based on legal requirements, industry standards, and business needs.

  • Data Deletion: When data is no longer required, it is securely deleted from all storage systems to prevent unauthorized access.

  • Compliance: Our data retention policies comply with regulations such as GDPR and CCPA, ensuring that personal data is handled responsibly and lawfully.


Secure Payment Processing

Ensuring the security of your financial transactions is a top priority. RentalTide employs industry-leading practices to protect your payment data and facilitate secure transactions.

Transaction Security

  • SSL/TLS Encryption: All payment data transmitted between your browser and our servers is encrypted using SSL/TLS protocols to prevent interception by malicious actors.

  • Tokenization: Sensitive payment information, such as credit card numbers, is replaced with unique tokens, minimizing the risk of data breaches.

  • Fraud Detection: Advanced algorithms monitor transactions in real-time to identify and prevent fraudulent activities.

  • Secure Payment Gateways: Integrates with trusted payment providers like Stripe to ensure secure transaction processing.

Stripe Integration Security

RentalTide leverages Stripe for secure and efficient payment processing. Our integration with Stripe adheres to the highest security standards to protect your financial information.

  • PCI DSS Compliance: Stripe complies with the Payment Card Industry Data Security Standard (PCI DSS), ensuring that all payment data is handled securely.

  • Secure API Integration: All interactions between RentalTide and Stripe occur over secure, encrypted APIs, safeguarding data exchange.

  • Webhooks Verification: Stripe webhooks are verified to ensure that event notifications are legitimate and untampered.

  • Token-Based Transactions: Payment tokens are used instead of storing sensitive card information, reducing the risk of data breaches.

  • Regular Security Audits: Both RentalTide and Stripe undergo regular security audits to maintain compliance with security standards and address potential vulnerabilities.


Account Management

Effective Account Management practices are essential for maintaining the security and integrity of user accounts within RentalTide.

Account Lockout Policies

  • Failed Login Attempts: Accounts are locked after a specified number of consecutive failed login attempts to prevent brute-force attacks.

  • Lockout Duration: Locked accounts remain inaccessible for a predetermined period or until manually unlocked by an administrator.

  • Notification: Users are notified via email when their accounts are locked due to failed login attempts.

Session Management

  • Session Timeouts: User sessions automatically expire after a period of inactivity, reducing the risk of unauthorized access from unattended devices.

  • Secure Cookies: Session cookies are secured with attributes like HttpOnly and Secure to prevent cross-site scripting (XSS) and man-in-the-middle (MITM) attacks.

  • Session Termination: Users can manually terminate active sessions from their account settings, providing control over their account access.

Account Recovery

  • Secure Recovery Processes: Account recovery processes, such as password resets, require multiple forms of verification to ensure that only authorized users can regain access.

  • Recovery Emails: Password reset links are sent to the user's registered email address, which should be kept secure and up-to-date.

  • Recovery Questions: If implemented, recovery questions are designed to be challenging for others to guess, enhancing account security.


Activity Logs and Monitoring

Comprehensive Activity Logs and Monitoring enable proactive security measures and effective incident response.

Audit Trails

  • Detailed Logging: All critical actions, including logins, permission changes, data access, and transaction processing, are meticulously logged.

  • Immutable Logs: Logs are stored in a manner that prevents tampering or unauthorized modifications, ensuring their integrity.

  • Accessible Reports: Administrators can generate and review audit reports to monitor user activities and identify potential security issues.

Real-Time Monitoring

  • Continuous Surveillance: The system continuously monitors user activities and system performance to detect anomalies and potential threats.

  • Automated Alerts: Real-time alerts notify administrators of suspicious activities, such as multiple failed login attempts or unauthorized data access.

  • Behavioral Analysis: Advanced algorithms analyze user behavior patterns to identify deviations that may indicate compromised accounts or insider threats.

Alerts and Notifications

  • Immediate Notifications: Receive instant notifications for critical security events, enabling swift action to mitigate risks.

  • Customizable Alert Settings: Administrators can configure which events trigger alerts, ensuring relevance and reducing unnecessary notifications.

  • Integration with Incident Response: Alerts are integrated with incident response workflows, facilitating coordinated and effective responses to security incidents.


Compliance with Standards

RentalTide adheres to various industry standards and regulations to ensure data protection, privacy, and operational integrity.

General Data Protection Regulation (GDPR)

  • Data Privacy: Ensures the protection of personal data and privacy of EU citizens.

  • User Rights: Provides users with rights to access, rectify, erase, and restrict the processing of their personal data.

  • Data Processing Agreements: Maintains agreements with data processors to uphold GDPR standards and responsibilities.

California Consumer Privacy Act (CCPA)

  • Consumer Rights: Grants California residents rights to know, delete, and opt-out of the sale of their personal information.

  • Transparency: Maintains clear and transparent data collection, usage, and sharing policies.

  • Compliance Audits: Regularly conducts audits to ensure ongoing compliance with CCPA requirements.

Payment Card Industry Data Security Standard (PCI DSS)

  • Secure Handling of Payment Data: Complies with PCI DSS to protect cardholder data during storage, processing, and transmission.

  • Regular Assessments: Conducts regular security assessments and vulnerability scans to maintain PCI DSS compliance.

  • Tokenization and Encryption: Utilizes tokenization and encryption to secure payment information and minimize exposure to sensitive data.

Health Insurance Portability and Accountability Act (HIPAA) (If Applicable)

  • Protected Health Information (PHI): Ensures the confidentiality, integrity, and availability of PHI.

  • Security Measures: Implements administrative, physical, and technical safeguards to protect PHI.

  • Breach Notification: Complies with HIPAA breach notification requirements, informing affected individuals and authorities in case of data breaches.


Best Practices

Implementing best practices enhances the overall security posture and reduces the risk of breaches.

Creating Strong Passwords

  • Length and Complexity: Use passwords that are at least 12 characters long, combining uppercase and lowercase letters, numbers, and special characters.

  • Avoid Predictable Patterns: Do not use easily guessable information such as birthdays, names, or common words.

  • Unique Passwords: Use a unique password for each account to prevent multiple breaches from compromising all your accounts.

Enabling Two-Factor Authentication (2FA)

  • Activate 2FA: Enable 2FA in your account settings to add an extra layer of security.

  • Use Authenticator Apps: Prefer using authenticator apps (e.g., Google Authenticator, Authy) over SMS-based 2FA for enhanced security.

  • Backup Codes: Store backup codes securely in case you lose access to your 2FA device.

Managing Permissions

  • Least Privilege Principle: Assign users only the permissions necessary for their roles to minimize potential security risks.

  • Regular Reviews: Periodically review and update user permissions to reflect changes in roles or responsibilities.

  • Temporary Access: Grant temporary permissions for specific tasks and revoke them once the tasks are completed to minimize security risks.

Regularly Reviewing Access Logs

  • Monitor Activities: Regularly inspect access logs to detect any unauthorized or suspicious activities.

  • Audit Trails: Utilize audit trails to track changes to permissions, data access, and user activities.

  • Respond to Alerts: Act promptly on security alerts to mitigate potential threats.

Keeping Software Updated

  • Automatic Updates: Enable automatic updates for all software components to ensure you receive the latest security patches.

  • Monitor Releases: Stay informed about new releases and updates from RentalTide to maintain optimal security.

  • Compatibility Checks: Before updating, verify that new versions are compatible with your existing integrations and workflows.


Managing Permissions

Properly managing permissions ensures that users have appropriate access levels, enhancing security and operational efficiency.

Understanding Roles and Permissions

Roles define a set of permissions assigned to users based on their responsibilities within the organization. Permissions determine what actions users can perform within the system.

  • Common Roles:

    • Admin: Full access to all features and settings, including user management and system configurations.

    • Manager: Access to management functionalities, such as overseeing store operations and viewing reports.

    • Staff: Basic access to perform daily tasks without access to sensitive settings or data.

Example Permissions:

  • profile_access: Grants access to the Profile Page.

  • profile_edit: Allows users to edit profile information.

  • stores_add: Enables users to add new store locations.

  • stores_edit: Permits users to edit existing store details.

  • stores_delete: Allows users to delete store locations.

  • stores_view_settings: Grants access to view and manage store-specific settings.

  • stores_view_stripe_connect: Enables users to manage Stripe Connect integrations for stores.

  • billing_view: Grants access to view billing statements and manage payment information.

  • billing_edit: Allows users to update payment methods and manage billing settings.

Assigning and Revoking Permissions

Assigning Permissions:

  1. Navigate to User Management:

    • Access the User Management section from the admin dashboard.

  2. Select the User:

    • Choose the user you wish to assign permissions to from the user list.

  3. Assign Role or Custom Permissions:

    • Role-Based Assignment: Select a predefined role (e.g., Admin, Manager) that includes the necessary permissions.

    • Custom Assignment: Manually select specific permissions to tailor access according to the user's responsibilities.

  4. Save Changes:

    • Confirm and save the updated permissions for the user.

Revoking Permissions:

  1. Access User Profile:

    • Go to the User Management section and select the user whose permissions you wish to revoke.

  2. Modify Permissions:

    • Deselect the permissions you want to remove or change the user's role to one with fewer permissions.

  3. Save Updates:

    • Confirm and save the changes to update the user's access rights.

Best Practices:

  • Least Privilege Principle: Always assign the minimum necessary permissions required for users to perform their roles effectively.

  • Regular Audits: Conduct periodic reviews of user permissions to ensure they remain appropriate as roles and responsibilities evolve.

  • Temporary Permissions: Grant temporary permissions for specific tasks and revoke them once the tasks are completed to minimize security risks.


Data Protection

Protecting your data is essential for maintaining trust and compliance with regulatory standards. RentalTide implements robust data protection measures to ensure the confidentiality, integrity, and availability of your data.

Data Storage and Encryption

  • Secure Storage Solutions: All data is stored in secure, encrypted databases with strict access controls to prevent unauthorized access.

  • Encryption Standards:

    • At Rest: Data stored in databases is encrypted using advanced encryption standards (e.g., AES-256).

    • In Transit: Data transmitted between your device and our servers is protected using TLS (Transport Layer Security) protocols.

  • Access Controls: Only authorized personnel have access to sensitive data, ensuring that data access is limited to those who need it for their roles.

Data Backup Policies

  • Regular Backups: Automated backups are performed daily to ensure data can be restored in case of accidental loss or system failures.

  • Redundancy: Backups are stored in multiple geographic locations to protect against data loss from natural disasters or hardware failures.

  • Secure Backup Storage: Backup data is encrypted and stored securely, adhering to the same security standards as primary data storage.

  • Disaster Recovery: Comprehensive disaster recovery plans are in place to restore data and services promptly in the event of a major incident.

Data Retention Policies

  • Retention Schedules: Data is retained based on legal requirements, industry standards, and business needs.

  • Data Deletion: When data is no longer required, it is securely deleted from all storage systems to prevent unauthorized access.

  • Compliance: Our data retention policies comply with regulations such as GDPR and CCPA, ensuring that personal data is handled responsibly and lawfully.


Secure Payment Processing

Ensuring the security of your financial transactions is a top priority. RentalTide employs industry-leading practices to protect your payment data and facilitate secure transactions.

Transaction Security

  • SSL/TLS Encryption: All payment data transmitted between your browser and our servers is encrypted using SSL/TLS protocols to prevent interception by malicious actors.

  • Tokenization: Sensitive payment information, such as credit card numbers, is replaced with unique tokens, minimizing the risk of data breaches.

  • Fraud Detection: Advanced algorithms monitor transactions in real-time to identify and prevent fraudulent activities.

  • Secure Payment Gateways: Integrates with trusted payment providers like Stripe to ensure secure transaction processing.

Stripe Integration Security

RentalTide leverages Stripe for secure and efficient payment processing. Our integration with Stripe adheres to the highest security standards to protect your financial information.

  • PCI DSS Compliance: Stripe complies with the Payment Card Industry Data Security Standard (PCI DSS), ensuring that all payment data is handled securely.

  • Secure API Integration: All interactions between RentalTide and Stripe occur over secure, encrypted APIs, safeguarding data exchange.

  • Webhooks Verification: Stripe webhooks are verified to ensure that event notifications are legitimate and untampered.

  • Token-Based Transactions: Payment tokens are used instead of storing sensitive card information, reducing the risk of data breaches.

  • Regular Security Audits: Both RentalTide and Stripe undergo regular security audits to maintain compliance with security standards and address potential vulnerabilities.


Account Management

Effective Account Management practices are essential for maintaining the security and integrity of user accounts within RentalTide.

Account Lockout Policies

  • Failed Login Attempts: Accounts are locked after a specified number of consecutive failed login attempts to prevent brute-force attacks.

  • Lockout Duration: Locked accounts remain inaccessible for a predetermined period or until manually unlocked by an administrator.

  • Notification: Users are notified via email when their accounts are locked due to failed login attempts.

Session Management

  • Session Timeouts: User sessions automatically expire after a period of inactivity, reducing the risk of unauthorized access from unattended devices.

  • Secure Cookies: Session cookies are secured with attributes like HttpOnly and Secure to prevent cross-site scripting (XSS) and man-in-the-middle (MITM) attacks.

  • Session Termination: Users can manually terminate active sessions from their account settings, providing control over their account access.

Account Recovery

  • Secure Recovery Processes: Account recovery processes, such as password resets, require multiple forms of verification to ensure that only authorized users can regain access.

  • Recovery Emails: Password reset links are sent to the user's registered email address, which should be kept secure and up-to-date.

  • Recovery Questions: If implemented, recovery questions are designed to be challenging for others to guess, enhancing account security.


Activity Logs and Monitoring

Comprehensive Activity Logs and Monitoring enable proactive security measures and effective incident response.

Audit Trails

  • Detailed Logging: All critical actions, including logins, permission changes, data access, and transaction processing, are meticulously logged.

  • Immutable Logs: Logs are stored in a manner that prevents tampering or unauthorized modifications, ensuring their integrity.

  • Accessible Reports: Administrators can generate and review audit reports to monitor user activities and identify potential security issues.

Real-Time Monitoring

  • Continuous Surveillance: The system continuously monitors user activities and system performance to detect anomalies and potential threats.

  • Automated Alerts: Real-time alerts notify administrators of suspicious activities, such as multiple failed login attempts or unauthorized data access.

  • Behavioral Analysis: Advanced algorithms analyze user behavior patterns to identify deviations that may indicate compromised accounts or insider threats.

Alerts and Notifications

  • Immediate Notifications: Receive instant notifications for critical security events, enabling swift action to mitigate risks.

  • Customizable Alert Settings: Administrators can configure which events trigger alerts, ensuring relevance and reducing unnecessary notifications.

  • Integration with Incident Response: Alerts are integrated with incident response workflows, facilitating coordinated and effective responses to security incidents.


Compliance with Standards

RentalTide adheres to various industry standards and regulations to ensure data protection, privacy, and operational integrity.

General Data Protection Regulation (GDPR)

  • Data Privacy: Ensures the protection of personal data and privacy of EU citizens.

  • User Rights: Provides users with rights to access, rectify, erase, and restrict the processing of their personal data.

  • Data Processing Agreements: Maintains agreements with data processors to uphold GDPR standards and responsibilities.

California Consumer Privacy Act (CCPA)

  • Consumer Rights: Grants California residents rights to know, delete, and opt-out of the sale of their personal information.

  • Transparency: Maintains clear and transparent data collection, usage, and sharing policies.

  • Compliance Audits: Regularly conducts audits to ensure ongoing compliance with CCPA requirements.

Payment Card Industry Data Security Standard (PCI DSS)

  • Secure Handling of Payment Data: Complies with PCI DSS to protect cardholder data during storage, processing, and transmission.

  • Regular Assessments: Conducts regular security assessments and vulnerability scans to maintain PCI DSS compliance.

  • Tokenization and Encryption: Utilizes tokenization and encryption to secure payment information and minimize exposure to sensitive data.

Health Insurance Portability and Accountability Act (HIPAA) (If Applicable)

  • Protected Health Information (PHI): Ensures the confidentiality, integrity, and availability of PHI.

  • Security Measures: Implements administrative, physical, and technical safeguards to protect PHI.

  • Breach Notification: Complies with HIPAA breach notification requirements, informing affected individuals and authorities in case of data breaches.


Frequently Asked Questions (FAQs)

1. How do I enable Two-Factor Authentication (2FA) for my account?

Answer:

  1. Navigate to Account Settings:

    • Log in to your RentalTide account and go to the Profile or Account Settings section.

  2. Locate Security Settings:

    • Find the Security or Authentication tab within the account settings.

  3. Enable 2FA:

    • Click on the Enable Two-Factor Authentication button.

  4. Choose Authentication Method:

    • Select your preferred 2FA method (e.g., Authenticator App).

  5. Set Up 2FA:

    • Follow the on-screen instructions to scan the QR code with your authenticator app and enter the verification code.

  6. Confirm and Save:

    • Once verified, confirm and save your 2FA settings. Backup codes will be provided—store them securely.

2. Why was my account locked after multiple failed login attempts?

Answer:

Your account was locked as a security measure to prevent unauthorized access through brute-force attacks. This lockout occurs after a predefined number of consecutive failed login attempts.

Steps to Unlock Your Account:

  1. Wait for Lockout Duration:

    • Your account will automatically unlock after a specified period (e.g., 30 minutes).

  2. Use Account Recovery:

    • If you need immediate access, use the Account Recovery option to reset your password securely.

  3. Contact Support:

    • If the issue persists or you suspect unauthorized access attempts, contact RentalTide support for assistance.

3. How can I view my activity logs?

Answer:

  1. Access User Management:

    • Administrators can navigate to the User Management section from the admin dashboard.

  2. Select the User:

    • Choose the user whose activity logs you wish to view.

  3. View Audit Trails:

    • Click on the Activity Logs or Audit Trails tab to view detailed records of the user's actions, including logins, permission changes, and data access.

  4. Generate Reports:

    • Use available tools to generate and export activity reports for further analysis or compliance purposes.

4. What should I do if I suspect my account has been compromised?

Answer:

  1. Change Your Password:

    • Immediately change your account password to a strong, unique one.

  2. Enable Two-Factor Authentication (2FA):

    • If not already enabled, set up 2FA to add an extra layer of security.

  3. Review Account Activity:

    • Check your activity logs for any unauthorized or suspicious activities.

  4. Revoke Active Sessions:

    • Terminate all active sessions to prevent further unauthorized access.

  5. Contact Support:

    • Notify RentalTide support about the suspected compromise for further assistance and to initiate any necessary security measures.

5. How do I update my payment information securely?

Answer:

  1. Navigate to Billing Settings:

    • Log in to your RentalTide account and go to the Billing or Payment Information section.

  2. Update Payment Method:

    • Click on Update Payment Method and enter your new payment details.

  3. Verify Information:

    • Ensure that all entered information is accurate and up-to-date.

  4. Save Changes:

    • Confirm and save your updated payment information. A verification step may be required for security purposes.

  5. Confirmation:

    • You will receive a confirmation email once your payment information has been successfully updated.

6. Can I customize the security settings for my account?

Answer:

Yes, you can customize certain security settings to enhance the protection of your account:

  • Two-Factor Authentication (2FA): Enable or disable 2FA based on your security preferences.

  • Password Management: Change your password periodically and ensure it meets strength requirements.

  • Session Controls: Terminate active sessions from your account settings if you suspect unauthorized access.

  • Permission Management: If you have administrative privileges, manage user permissions to control access levels.

7. What measures does RentalTide take to protect my data?

Answer:

RentalTide implements a comprehensive set of security measures to protect your data:

  • Encryption: All data is encrypted both at rest and in transit using industry-standard protocols.

  • Access Controls: Strict access controls ensure that only authorized personnel can access sensitive data.

  • Regular Audits: Conducts regular security audits and assessments to identify and mitigate potential vulnerabilities.

  • Compliance: Adheres to data protection regulations such as GDPR, CCPA, and PCI DSS to ensure responsible data handling.


Troubleshooting

Issue 1: Unable to Enable Two-Factor Authentication (2FA)

Possible Cause: Browser issues, JavaScript errors, or network connectivity problems.

Solution:

  1. Check Internet Connection:

    • Ensure your device is connected to the internet.

  2. Use Supported Browser:

    • Make sure you are using a compatible browser (e.g., Chrome, Firefox, Edge).

  3. Clear Browser Cache:

    • Clear your browser’s cache and cookies to resolve potential conflicts.

  4. Disable Browser Extensions:

    • Temporarily disable extensions that might interfere with the setup process.

  5. Refresh the Page:

    • Reload the account settings page and attempt to enable 2FA again.

  6. Contact Support:

    • If the issue persists, reach out to RentalTide support for assistance.

Issue 2: Activity Logs Not Updating

Possible Cause: System delays, caching issues, or backend processing errors.

Solution:

  1. Wait for Synchronization:

    • Activity logs may take a few minutes to update after actions are performed.

  2. Refresh the Page:

    • Reload the User Management or Activity Logs page to fetch the latest data.

  3. Clear Browser Cache:

    • Clear your browser’s cache to ensure you're viewing the most recent logs.

  4. Check System Status:

    • Verify if there are any ongoing system issues or maintenance activities affecting log updates.

  5. Contact Support:

    • If logs are still not updating, contact RentalTide support with specific details for further investigation.

Issue 3: Cannot Update Payment Information

Possible Cause: Invalid payment details, browser issues, or account restrictions.

Solution:

  1. Verify Payment Details:

    • Ensure that all entered payment information is correct and complies with the required formats.

  2. Use Supported Payment Methods:

    • Confirm that the payment method you are trying to use is supported by RentalTide.

  3. Check Browser Compatibility:

    • Use a compatible and up-to-date browser to perform the update.

  4. Clear Browser Cache:

    • Clear your browser’s cache and cookies to resolve potential conflicts.

  5. Refresh the Page:

    • Reload the Billing or Payment Information page and attempt to update again.

  6. Contact Support:

    • If you continue to experience issues, contact RentalTide support for assistance.

Issue 4: Unexpected Account Lockouts

Possible Cause: Multiple failed login attempts, automated security measures, or unauthorized access attempts.

Solution:

  1. Understand Lockout Triggers:

    • Recognize that multiple failed login attempts will trigger an account lockout as a security measure.

  2. Wait for Lockout Duration:

    • Your account will automatically unlock after the specified lockout period (e.g., 30 minutes).

  3. Reset Password:

    • If you believe your account is being targeted, reset your password to secure your account.

  4. Review Recent Activities:

    • Check your activity logs for any unauthorized access attempts.

  5. Enhance Security Measures:

    • Enable 2FA to add an extra layer of security to your account.

  6. Contact Support:

    • If you suspect malicious activity or need immediate assistance, contact RentalTide support.

Issue 5: Security Notifications Not Received

Possible Cause: Email delivery issues, spam filters, or incorrect contact information.

Solution:

  1. Check Spam/Junk Folder:

    • Ensure that security notifications are not being filtered into your spam or junk mail folder.

  2. Verify Email Address:

    • Confirm that your registered email address is correct and up-to-date in your account settings.

  3. Whitelist RentalTide Emails:

    • Add RentalTide’s email address to your email client's whitelist to ensure notifications are received.

  4. Check Email Server Status:

    • Verify if there are any issues with your email service provider that might affect email delivery.

  5. Contact Support:

    • If you are still not receiving security notifications, contact RentalTide support to verify your contact information and resolve any delivery issues.

Did this answer your question?