Data Security

  1. Risk Assessement
    1. As per our assessment, since we are holding bare minimum details of users, the risk to user privacy is perceived to be low.
  2. The following security measures are considered adequate
    1. Controlled access using passwords, strictly on a need to know basis
      1. User Database
      2. Machines containing user data
    2. The passwords are encrypted.
    3. All data transfers between machines on the internet are encrypted.
  3. Recovery from a technical OR physical incident
    1. Backups are taken at regular intervals.
    2. In the worst case scenario of a server being unavailable, the systems should be operational within 24 hours of incident.
    3. Only N copies of historical backup’s will be maintained. So, when a user deletes his record, the record will be completely erased from our backups after N cycles.