Data Security Policy
The https://msmeudyogaadhar.org (“msmeudyogaadhar.org”, “We”, “Us” or “Our”) data security policy covers our Services and Websites located at https://msmeudyogaadhar.org (hereinafter collectively referred to as “Service(s)”).
We value the unwavering trust that our users place in us as custodians of their data. We understand our responsibility and take appropriate care to protect and secure your details seriously as described in our security practices below.
The terms “customer” “you” “your” “user” and “users” refer to all individuals and other persons who access or use our services, including, without limitation, any companies, organizations, or other legal entities that register accounts or otherwise access or use the Services through their respective employees, agents, or representatives.
https://msmeudyogaadhar.org is compliant with the Payment Data Security Standards via the third-party payment providers we use and can therefore accept or process credit card information securely in accordance with these standards.
3. Access Control
Access to our technology resources is only permitted through secure connectivity (for e. g. Https) and requires authentication. Our password policy requires complexity, expiration, lock out and disallows reuse. We grant access on a need to know on the basis of least privilege rules, reviews permissions quarterly, and revokes access immediately after employee termination.
4. Security Policies
We review and update our security policies at least annually. Our employees are obligated to acknowledge policies on an annual basis and are provided training for assuring data security and job specific security and skill development for key job functions.
5. Physical Security
Our information systems and technical infrastructure are equipped within world-class Data Centre located in India. Physical security controls at our data centres include camera surveillance, visitor logs, security personnel etc.
6. Personnel Screening
We conduct background research at the time of hire of executives and employees (to the extent permitted or facilitated by applicable laws and countries). In addition, we communicate our data security policies to all employees (who must acknowledge this) and require new employees to sign non-disclosure agreements and provide ongoing privacy and security training to secure data.
7. Penetration Testing and System Vulnerability Assessments
We have a vulnerability assessment program which includes periodic scans, identification, and remediation of security vulnerabilities on servers, network equipment, and applications. All networks, including test and production environments, are regularly scanned using trusted third-party vendors.
We also conduct regular internal and external penetration tests and remediate according to severity for any results found.
8. Data Transit Encryption
We encrypt data in transit using Industry Standard SSL
9. Asset Management
We maintain electronic records for identification, classification, retention and disposal of assets. The owner of such a record is the Information Security Officer. It is the responsibility of the Information Security Officer to ensure accurate, timely and periodic revision of the asset management records. Company-issued devices are equipped with hard disk encryption and up-to-date antivirus software. Only company-issued devices are permitted to access corporate and production networks.
Our development team employs secure coding techniques and best practices while development. Our Developers are formally trained in secure web application development practices upon hire and at least once every six months.
11. Information Security Incident Response Management
We maintain all security incident response policies and procedures covering the initial response, investigation, public communication and remediation. These policies are reviewed at regular interval of time and tested bi-annually.
12. Notification of Breach
Despite all the best efforts, no method of transmission over the Internet, or method of electronic storage, is perfectly secure. Therefore, we cannot guarantee absolute security to data stored. However, if we learn of a security breach, we will notify affected users so that they can take appropriate protective steps to protect data. We are committed to keeping our customers fully informed of any matters relevant to the security of their account and to providing customers all information necessary for them to meet their own regulatory reporting obligations.
13. Business Continuity
We backed up our databases on a regular basis and are verified regularly. Backups are encrypted and stored securely within the production environment to preserve their confidentiality and integrity and are tested regularly to ensure availability.
14. Customer Responsibilities
Keeping your data secure also requires that user maintains the security of his account by using sufficiently complicated safety measure like passwords and storing them safely. You should also ensure that you have sufficient security measures installed on your own systems.
15. Logging and Monitoring
Our systems log information to a centrally managed log repository for troubleshooting, security reviews, and analysis by authorized personnel. We will provide users with reasonable assistance in the event of a security incident impacting their account.
In case of any queries that you may contact to our Information Security Officer at email@example.com.