Security and Privacy

We engage industry-leading tools to perform various routine scans of the application and infrastructure. We also employ real-time intrusion detection systems.

Your data is encrypted during transmission using SSL and stored using various algorithms. Firewalls protect it, and we have state-of-the-art intrusion detection mechanisms. Passwords are encrypted and irrecoverable.
Role-based access controls and a dynamic permissions matrix enable a secure environment for all stakeholders—encryption at all phases - storage and transit.
External vendors periodically test and scan our systems; our development center is certified for ISO27001 and ISO9001. We are in the process of scheduling our SOC 2 audit for Q2 2022.
The data is located in US-based Type IV data centers with primary and backup facilities in geographically diverse locations. Your data will always remain on US-based servers only.
You own and control all your data and can back up and export it anytime. We will only share it with you if you request it in writing. Our privacy policy is available online at the following location.
Access to your application and data is available only to your authenticated users. Users must log in with their passwords. OTP is sent via email and SMS every time a new session is initiated. Role-based access control (RBAC) ensures that the right users get access to the assigned resources.