DATA & PRIVACY
Introduction
Data Encryption and Security
-
All data transmissions across the platform are protected using advanced encryption standards for secure communications.
-
Data storage employs robust encryption methods to ensure confidentiality and security of stored information.
Access Control
-
Strict Role-Based Access Control (RBAC) ensures that users access only the data necessary for their operational needs.
-
Multi-factor authentication (MFA) is enforced for all administrative and critical access points to enhance security.
Provisions
Data Integrity and Redundancy
-
The Company employs comprehensive redundancy strategies, including frequent backups, to ensure data integrity and availability.
-
Automatic failover mechanisms are implemented to maintain uninterrupted service and data continuity.
Incident Detection and Response
-
Continuous monitoring systems are in place to detect potential security breaches or anomalies.
-
A dedicated incident response team is ready to promptly manage any security incidents, ensuring minimal disruption and risk mitigation.
-
Clear communication channels and procedures are defined for reporting, investigating, and responding to security incidents.
Further Provisions
Data Governance
-
The Company enforces strict internal data governance policies, with clearly defined roles, responsibilities, and accountability mechanisms.
-
Regular internal audits and assessments ensure that data handling and processing practices meet rigorous security standards.
User Data Management
-
Users retain rights over their data, and processes are in place to manage data correction, deletion, and access upon user request.
-
Data retention policies strictly align with legal requirements and operational necessities, ensuring minimal data storage beyond what is necessary.
Third-Party Management
-
Third-party vendors undergo detailed security evaluations and ongoing oversight to ensure compliance with the Company's stringent data security requirements.
-
Contractual agreements with third-party vendors explicitly define expectations regarding data handling, privacy obligations, and incident response protocols.
