Our Policies

/

Data Security Policy

Data Security Policy

Infrastructure Security and Architecture

Our data security infrastructure is built on industry-leading practices and technologies designed to protect user information from unauthorized access, theft, and manipulation. We utilize a multi-layered security architecture that includes network security, application security, and data security controls implemented at every level of our technology stack. Our systems are designed with security as a fundamental principle, not as an afterthought.

We employ advanced encryption technologies to protect data both in transit and at rest. All communications between users and our servers are encrypted using Transport Layer Security (TLS) protocols, and sensitive data stored in our databases is encrypted using Advanced Encryption Standard (AES) encryption with appropriate key management procedures. Our encryption keys are stored separately from encrypted data and are regularly rotated according to industry best practices.

Access Controls and Authentication Systems

We implement strict access controls to ensure that only authorized personnel can access user data, and only for legitimate business purposes. Our access control system uses role-based permissions that limit employee access to the minimum data necessary to perform their job functions. All access to user data is logged and monitored, with automated alerts for unusual access patterns or potential security violations.

Our employee authentication system requires multi-factor authentication for all accounts with access to production systems or user data. We regularly review and update employee access permissions, automatically removing access when employees change roles or leave the company. Critical system access requires additional approvals and is monitored in real-time by our security operations center.

Vulnerability Management and Security Testing

We maintain a comprehensive vulnerability management program that includes regular security assessments, penetration testing, and code reviews. Our security team conducts ongoing vulnerability scans of our infrastructure and applications, with critical vulnerabilities addressed within defined time frames based on their severity and potential impact.

We operate a responsible disclosure program that allows security researchers to report vulnerabilities they discover in our systems. Researchers who report valid security issues through our program may be eligible for recognition and monetary rewards. We work closely with the security research community to identify and address potential security issues before they can be exploited maliciously.

Incident Response and Recovery Procedures

Our incident response procedures are designed to quickly detect, contain, and remediate security incidents while minimizing impact on users and our services. Our security operations center monitors our systems 24/7 for signs of security incidents, using automated detection systems and expert human analysts to identify potential threats.

When a security incident is detected, our incident response team follows established procedures to assess the scope and impact of the incident, contain any ongoing threats, preserve evidence for investigation, and notify affected users and regulatory authorities as required by law. We maintain detailed incident response playbooks for different types of security incidents and regularly test these procedures through tabletop exercises and simulated attacks.

Data Backup and Recovery Systems

We maintain comprehensive backup systems to protect against data loss and ensure business continuity in the event of system failures or security incidents. Our backup systems include multiple redundant copies of critical data stored in geographically distributed locations with appropriate security controls and encryption. Our backup procedures are tested regularly to ensure that data can be recovered quickly and completely when needed.

We maintain detailed recovery procedures for different types of data loss scenarios and regularly conduct disaster recovery exercises to validate our ability to restore services and data within defined recovery time objectives.

Third-Party Security and Vendor Management

All third-party vendors and service providers who have access to our systems or user data must undergo rigorous security assessments before being approved for engagement. Our vendor security program includes due diligence reviews, security questionnaires, contract security requirements, and ongoing monitoring of vendor security practices.

We require vendors to implement security controls that meet or exceed our own security standards and to notify us immediately of any security incidents that could affect our users' data. Our vendor contracts include specific security requirements, audit rights, and incident notification obligations. We regularly review vendor security practices and may require additional security measures or terminate relationships with vendors who fail to meet our security standards.

Compliance and Regulatory Requirements

Our data security program is designed to comply with applicable laws and regulations, including data protection regulations such as the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and sector-specific regulations that may apply to our business. We regularly review and update our security practices to ensure ongoing compliance with evolving regulatory requirements.

We maintain documentation of our security controls and practices to demonstrate compliance with applicable regulations and industry standards. Our security program is audited regularly by independent third-party auditors.

Copyright © 2025 Digizenship.

Contact Information

Digizenship Ltd, 86-90 Paul Street, London, England, EC2A 4NE

support@digizenship.com

Home

Get help

Our Policies

Copyright © 2025 Digizenship.

Contact Information

Digizenship Ltd, 86-90 Paul Street, London, England, EC2A 4NE

support@digizenship.com

Our Policies

/

Data Security Policy

Data Security Policy

Infrastructure Security and Architecture

Our data security infrastructure is built on industry-leading practices and technologies designed to protect user information from unauthorized access, theft, and manipulation. We utilize a multi-layered security architecture that includes network security, application security, and data security controls implemented at every level of our technology stack. Our systems are designed with security as a fundamental principle, not as an afterthought.

We employ advanced encryption technologies to protect data both in transit and at rest. All communications between users and our servers are encrypted using Transport Layer Security (TLS) protocols, and sensitive data stored in our databases is encrypted using Advanced Encryption Standard (AES) encryption with appropriate key management procedures. Our encryption keys are stored separately from encrypted data and are regularly rotated according to industry best practices.

Access Controls and Authentication Systems

We implement strict access controls to ensure that only authorized personnel can access user data, and only for legitimate business purposes. Our access control system uses role-based permissions that limit employee access to the minimum data necessary to perform their job functions. All access to user data is logged and monitored, with automated alerts for unusual access patterns or potential security violations.

Our employee authentication system requires multi-factor authentication for all accounts with access to production systems or user data. We regularly review and update employee access permissions, automatically removing access when employees change roles or leave the company. Critical system access requires additional approvals and is monitored in real-time by our security operations center.

Vulnerability Management and Security Testing

We maintain a comprehensive vulnerability management program that includes regular security assessments, penetration testing, and code reviews. Our security team conducts ongoing vulnerability scans of our infrastructure and applications, with critical vulnerabilities addressed within defined time frames based on their severity and potential impact.

We operate a responsible disclosure program that allows security researchers to report vulnerabilities they discover in our systems. Researchers who report valid security issues through our program may be eligible for recognition and monetary rewards. We work closely with the security research community to identify and address potential security issues before they can be exploited maliciously.

Incident Response and Recovery Procedures

Our incident response procedures are designed to quickly detect, contain, and remediate security incidents while minimizing impact on users and our services. Our security operations center monitors our systems 24/7 for signs of security incidents, using automated detection systems and expert human analysts to identify potential threats.

When a security incident is detected, our incident response team follows established procedures to assess the scope and impact of the incident, contain any ongoing threats, preserve evidence for investigation, and notify affected users and regulatory authorities as required by law. We maintain detailed incident response playbooks for different types of security incidents and regularly test these procedures through tabletop exercises and simulated attacks.

Data Backup and Recovery Systems

We maintain comprehensive backup systems to protect against data loss and ensure business continuity in the event of system failures or security incidents. Our backup systems include multiple redundant copies of critical data stored in geographically distributed locations with appropriate security controls and encryption. Our backup procedures are tested regularly to ensure that data can be recovered quickly and completely when needed.

We maintain detailed recovery procedures for different types of data loss scenarios and regularly conduct disaster recovery exercises to validate our ability to restore services and data within defined recovery time objectives.

Third-Party Security and Vendor Management

All third-party vendors and service providers who have access to our systems or user data must undergo rigorous security assessments before being approved for engagement. Our vendor security program includes due diligence reviews, security questionnaires, contract security requirements, and ongoing monitoring of vendor security practices.

We require vendors to implement security controls that meet or exceed our own security standards and to notify us immediately of any security incidents that could affect our users' data. Our vendor contracts include specific security requirements, audit rights, and incident notification obligations. We regularly review vendor security practices and may require additional security measures or terminate relationships with vendors who fail to meet our security standards.

Compliance and Regulatory Requirements

Our data security program is designed to comply with applicable laws and regulations, including data protection regulations such as the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and sector-specific regulations that may apply to our business. We regularly review and update our security practices to ensure ongoing compliance with evolving regulatory requirements.

We maintain documentation of our security controls and practices to demonstrate compliance with applicable regulations and industry standards. Our security program is audited regularly by independent third-party auditors.