top of page

DATA & PRIVACY

Introduction

Data Encryption and Security

  • All data transmissions across the platform are protected using advanced encryption standards for secure communications.

  • Data storage employs robust encryption methods to ensure confidentiality and security of stored information.

Access Control

  • Strict Role-Based Access Control (RBAC) ensures that users access only the data necessary for their operational needs.

  • Multi-factor authentication (MFA) is enforced for all administrative and critical access points to enhance security.

Provisions

Data Integrity and Redundancy

  • The Company employs comprehensive redundancy strategies, including frequent backups, to ensure data integrity and availability.

  • Automatic failover mechanisms are implemented to maintain uninterrupted service and data continuity.

Incident Detection and Response

  • Continuous monitoring systems are in place to detect potential security breaches or anomalies.

  • A dedicated incident response team is ready to promptly manage any security incidents, ensuring minimal disruption and risk mitigation.

  • Clear communication channels and procedures are defined for reporting, investigating, and responding to security incidents.

Further Provisions

Data Governance

  • The Company enforces strict internal data governance policies, with clearly defined roles, responsibilities, and accountability mechanisms.

  • Regular internal audits and assessments ensure that data handling and processing practices meet rigorous security standards.

User Data Management

  • Users retain rights over their data, and processes are in place to manage data correction, deletion, and access upon user request.

  • Data retention policies strictly align with legal requirements and operational necessities, ensuring minimal data storage beyond what is necessary.

Third-Party Management

  • Third-party vendors undergo detailed security evaluations and ongoing oversight to ensure compliance with the Company's stringent data security requirements.

  • Contractual agreements with third-party vendors explicitly define expectations regarding data handling, privacy obligations, and incident response protocols.

bottom of page