Security Policy

Security Policy

At SALEAZY TECHNOLOGIES PRIVATE LIMITED ("SALEAZY," "we," "us," or "our"), we prioritize the security of your data and strive to protect your information with industry-leading practices. This Security Policy outlines the measures we take to safeguard our SaaS platform and ensure your data remains secure.
 

At SALEAZY TECHNOLOGIES PRIVATE LIMITED ("SALEAZY," "we," "us," or "our"), we prioritize the security of your data and strive to protect your information with industry-leading practices. This Security Policy outlines the measures we take to safeguard our SaaS platform and ensure your data remains secure.
 

  1. Data Protection

  1. Data Protection

  1. Data Encryption: All data transmitted between your device and our servers is encrypted using TLS (Transport Layer Security). Data at rest is encrypted using AES-256 to prevent unauthorized access.

  2. Access Control: We implement strict access controls to ensure that only authorized personnel can access sensitive data.

  3. Data Backup: Regular backups are performed to ensure data integrity and availability. Backups are encrypted and stored securely to protect against data loss or corruption.

  1. Data Encryption: All data transmitted between your device and our servers is encrypted using TLS (Transport Layer Security). Data at rest is encrypted using AES-256 to prevent unauthorized access.

  2. Access Control: We implement strict access controls to ensure that only authorized personnel can access sensitive data.

  3. Data Backup: Regular backups are performed to ensure data integrity and availability. Backups are encrypted and stored securely to protect against data loss or corruption.

  1. Infrastructure Security

  1. Secure Hosting: Our SaaS platform is hosted on secure, industry-leading cloud infrastructure providers, ensuring robust physical and environmental security controls.

  2. Network Security: We employ advanced firewalls, intrusion detection systems, and continuous monitoring to protect our network from unauthorized access and attacks.

  3. Patch Management: All systems and applications are regularly updated with the latest security patches to mitigate vulnerabilities.

  1. Secure Hosting: Our SaaS platform is hosted on secure, industry-leading cloud infrastructure providers, ensuring robust physical and environmental security controls.

  2. Network Security: We employ advanced firewalls, intrusion detection systems, and continuous monitoring to protect our network from unauthorized access and attacks.

  3. Patch Management: All systems and applications are regularly updated with the latest security patches to mitigate vulnerabilities.

  1. Application Security

  1. Application Security

  1. Secure Development: Our development process incorporates security best practices, including code reviews, vulnerability scanning, and automated testing to identify and address security issues early.

  2. Penetration Testing: Regular third-party penetration tests are conducted to evaluate the security of our platform and identify potential vulnerabilities.

  3. Incident Response: We have a comprehensive incident response plan in place to quickly detect, respond to, and mitigate security incidents. Our team is trained to handle security breaches and minimize impact.

  1. Secure Development: Our development process incorporates security best practices, including code reviews, vulnerability scanning, and automated testing to identify and address security issues early.

  2. Penetration Testing: Regular third-party penetration tests are conducted to evaluate the security of our platform and identify potential vulnerabilities.

  3. Incident Response: We have a comprehensive incident response plan in place to quickly detect, respond to, and mitigate security incidents. Our team is trained to handle security breaches and minimize impact.

  1. User Responsibility

  1. Account Security: Users are responsible for maintaining the confidentiality of their account credentials and must use strong, unique passwords.

  2. Security Awareness: We encourage users to stay informed about security best practices and to report any suspicious activity or potential security issues to our support team immediately.

  1. Account Security: Users are responsible for maintaining the confidentiality of their account credentials and must use strong, unique passwords.

  2. Security Awareness: We encourage users to stay informed about security best practices and to report any suspicious activity or potential security issues to our support team immediately.

  1. Compliance

Our security practices comply with relevant industry standards and regulations, including GDPR.

We regularly review and update our policies to ensure ongoing compliance and protection of your data.

Our security practices comply with relevant industry standards and regulations, including GDPR.

We regularly review and update our policies to ensure ongoing compliance and protection of your data.

  1. Changes to this policy :

This Security Policy may be modified from time to time as our business practices and legal requirements evolve. If this Security Policy is modified, we will provide notice of the change by posting the updated Security Policy on this website (or its successor), and we will include the effective date of the update.

This Security Policy may be modified from time to time as our business practices and legal requirements evolve. If this Security Policy is modified, we will provide notice of the change by posting the updated Security Policy on this website (or its successor), and we will include the effective date of the update.

​If you disagree with the Security Policy or any changes to it, you should delete your account by following the process we have described above, and you should avoid providing any information to us.

​If you disagree with the Security Policy or any changes to it, you should delete your account by following the process we have described above, and you should avoid providing any information to us.

  1. How to contact us

If you have any requests, questions, comments, or concerns regarding our Security Policy or practices, please contact us using the details below: You can contact our Security team, including our Data Protection Officer, by emailing us at [email protected]

If you have any requests, questions, comments, or concerns regarding our Security Policy or practices, please contact us using the details below: You can contact our Security team, including our Data Protection Officer, by emailing us at [email protected]