Effective Date: 24-08-2024
At Sakman Business Solution, we prioritize the security of your data and are committed to implementing robust measures to protect it. This Security Policy outlines the steps we take to safeguard your information from unauthorized access, use, and breaches.
1.1 Data Encryption: We use advanced encryption protocols to protect your data during transmission and storage. This includes SSL/TLS encryption for data in transit and encryption at rest for stored data.
1.2 Secure Access Controls: Access to sensitive data is restricted to authorized personnel only. We employ multi-factor authentication (MFA) and strong password policies to ensure that only verified users can access our systems and data.
1.3 Regular Security Audits: We conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in our systems. These audits are performed by internal teams and external security experts.
2.1 Data Minimization: We collect and process only the data necessary to provide our services and meet legal requirements. Unnecessary data is not collected or retained beyond its useful purpose.
2.2 Data Segregation: Data is segmented based on its sensitivity and access controls are applied accordingly. This segregation minimizes the risk of unauthorized access to sensitive information.
2.3 Regular Backups: We perform regular backups of critical data to ensure its availability and integrity in the event of data loss or corruption. Backup data is encrypted and stored securely.
3.1 Incident Response Plan: We have established a comprehensive incident response plan to address security breaches and data incidents promptly. This plan includes procedures for containment, investigation, notification, and remediation.
3.2 Breach Notification: In the event of a data breach, we will notify affected individuals and relevant authorities in accordance with applicable laws and regulations. We will provide details on the nature of the breach, the data affected, and the steps being taken to address the issue.
4.1 Security Training: All employees receive regular security training to ensure they are aware of potential threats and best practices for protecting data. Training includes phishing awareness, secure data handling, and incident reporting.
4.2 Access Review: Access permissions are reviewed regularly to ensure that employees have the appropriate level of access based on their roles and responsibilities. Access is adjusted as needed when roles change.
5.1 Vendor Management: We carefully evaluate third-party vendors and service providers to ensure they meet our security standards. Contracts with vendors include data protection clauses and require compliance with relevant security practices.
5.2 Data Sharing: When sharing data with third parties, we ensure that appropriate safeguards are in place to protect the data. This includes data processing agreements and confidentiality commitments.
If you have any questions or concerns about our Security Policy or the measures we implement to protect your data, please contact us at:
Sakman Business Solution
Email: info@sakmanbusinesssolution.com
Phone: (+91) 8595 878 365
Address: New Delhi
Copyrights © 2024 All Rights Reserved, Powered by Sakman Solutions.
Instant Support