Skip to main content
Security & Compliance

Data security & compliance

We protect your business data with disciplined practices, secure infrastructure, and clear policies you can rely on.

NDA policy

We sign Non-Disclosure Agreements (NDAs) for client engagements so your business information, data, and proprietary processes stay confidential. We do not share or disclose client information to third parties without explicit written consent.

Our team members are bound by confidentiality agreements, and we maintain strict access controls so only authorized personnel can access client data.

Data handling practices

We handle your data with care and follow industry best practices for data management:

  • Data is stored only on secure, encrypted servers or cloud platforms
  • Client data is never used for purposes other than project requirements
  • Data access is logged and monitored for security compliance
  • Data retention policies ensure data is deleted when no longer needed
  • Regular security audits and assessments of data handling procedures

Encryption standards

We use industry-standard encryption to protect data in transit and at rest:

  • Data in transit: Connections use TLS 1.2 or higher (HTTPS/SSL) for encrypted transmission
  • Data at rest: Database and file storage use encryption (AES-256 or equivalent)
  • API security: API endpoints use authentication tokens and encrypted connections
  • Secure protocols: SFTP, HTTPS, and secure database connections for data transfers

Access controls

We implement strict access controls so only authorized personnel can access your systems and data:

  • Role-based access control (RBAC) limits access to authorized personnel only
  • Multi-factor authentication (MFA) for access to sensitive systems
  • Regular access reviews so permissions stay appropriate
  • Access logs and monitoring for compliance and audit trails
  • Prompt revocation of access when team members leave or projects end

Backup procedures

Regular backups help protect your data against loss or corruption:

  • Automated daily backups of critical data and databases
  • Encrypted backups stored in secure, off-site locations
  • Regular restoration testing to verify recovery
  • Retention policies so backups remain available as required
  • Documented disaster recovery procedures, tested on a sensible cadence

Compliance readiness

We maintain security practices aligned with common industry expectations. We are not certified for every standard, but we follow practices consistent with:

  • Data protection: Approaches aligned with privacy and data protection regulations
  • Secure development: Secure coding practices and periodic security assessments
  • Audit trails: Logging and audit trails for compliance and monitoring
  • Documentation: Security policies and procedures documented and maintained

For specific compliance needs (for example GDPR, SOC 2, HIPAA), we can discuss additional measures for your project.

Questions about security?

If you have specific security or compliance requirements, contact us and we will respond in a structured, good-faith manner.