Privacy Practices

We do not sell your personal information to or share it with unaffiliated third parties for their own advertising or marketing purposes without your explicit consent.

Check out our Privacy Policy for more information.

Cloud Infrastructure is hosted on a Virtual Private Cloud on AWS or Google Cloud or Microsoft Azure services which provides a secure and scalable technology platform to ensure we can provide you services securely and reliably.

Perimeter Security

Our infrastructure is launched in compliance with AWS or Google Cloud or Azure Architected Framework and from the security perspective incorporating practices from the Azure Framework.

Host Security

We use industry leading solutions around anti-virus, anti-malware, intrusion prevention systems, intrusion detection systems, file integrity monitoring, application control, application and audit log aggregation, and automated patching.

Data Security

We employ separation of environments and segregation of duties and have strict role- based access control on a documented, authorized, need-to-use basis We use key management services to limit access to data except the data team Stored data is protected by encryption at rest and sensitive data by application level encryption We use data replication for data resiliency, snapshotting for data durability and backup/restore testing for data reliability. Incident and Change Management We have deployed mature processes around Change Management which enables us to release thoroughly tested features for you both reliably and securely enabling you to enjoy the experience with maximum assurance We have a very aggressive stance on Incident Management on both Systems downtime and Security and have a Network Operations Center and an Information Security Management System in place which quickly reacts, remediates or escalates any Incidents arising out of planned or unplanned changes.