Security & Privacy

iLab provides a secure software solution with core facility management and lab management modules. All data entered into iLab is wholly owned by the cores and institution administration. iLab treats data integrity, availability, and security very seriously, ensuring no data loss as well as accessible, portable and usable data.

Presently, specific data related to Reporting and Billing can be downloaded directly from each core’s site. There are two locations within the system where any core administrator or institution administrator can download specific data.

iLab keeps intellectual property safe and secure using state of the art technology. We work continuously with users to identify information-security needs, and with experts in hardware, application and network security to meet those needs. We protect against multiple types of security threats including:

  • Damage or unauthorized access to hardware
  • Buffer overflow attacks
  • Application or OS vulnerability and misconfiguration
  • Data malformation attacks, including SQL injection, and XSS
  • Session fixation attacks
  • Sniffing/eavesdropping
  • Network attacks


iLab has developed infrastructure that lets cores retrieve their data through a restful API in XML and/or JSON format. For more detailed information about our API, please contact

Security Management Document

For more detailed information on iLab privacy and security, please view our Security Management Document.

Addressing Government Access to Data

iLab's CEO, Tad Fallows, has written the President urging him to restore confidence in internet users by leading the global community in security and privacy reform . Click to view iLab CEO's Letter to the President