Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Risk AssessemntAssessement
    1. As per our assessment, since we are holding bare minimum details of users, the risk to user privacy is perceived to be low.
  2. The following security measures are considered adequate
    1. Controlled access to the database using passwords, strictly on a need to know basis.
      1. User Database
      2. Machines containing user data
    2. The passwords are encrypted.
    3. All data transfers between machines on the internet are encrypted.
  3. Recovery from a technical OR physical incident
    1. Backups are taken at regular intervals.
    2. In the worst case scenario of a server being unavailable, the systems should be operational within 24 hours of incident.
    3. Only N copies of historical backup’s will be maintained. So, when a user deletes his record, the record will be completely erased from our backups after N cycles.