Security Practices Document

Our Commitment to Data Protection

1. Framework

We follow **IT Act 2000** and **DPDP security norms**.

2. Technical Controls

  • SSL encryption
  • Encrypted DB
  • Firewalls
  • IDS/IPS
  • Password hashing

3. Organizational Controls

  • Role-based access
  • NDA for staff
  • Security training

4. Incident Response

24/7 monitoring, breach investigation, **notification protocols**.

5. Backups

**Daily encrypted backups** with disaster recovery.