Security Policy

At Kuber TMS, protecting your data is our top priority. We employ the following measures to ensure the security, privacy, and integrity of your information:

1. Tier-1 Data Centers

We only use trusted Tier-1 Data Center providers like Oracle, AWS, and Microsoft Azure for hosting your data. These providers ensure industry-standard security and compliance.

2. Data Backups

We perform automatic daily backups of all data and store them in a secure, offsite location to ensure business continuity in case of an emergency.

3. Controlled Access

Our staff operates under a strict access-control policy. Access to customer data is approval-based and granted only for bug resolution or support purposes. Access is limited, tracked, and regularly reviewed.

4. Data Encryption

All customer data is encrypted during transmission and at rest using the latest encryption standards like AES-256. This ensures your data is protected from unauthorized access.

5. Multi-Factor Authentication (MFA)

We require multi-factor authentication for both internal access to sensitive systems and administrative control panels to further secure access.

6. Regular Security Audits

We perform periodic security audits and vulnerability assessments of our infrastructure to proactively identify and address any security gaps.

7. Monitoring and Intrusion Detection

Our systems are continuously monitored for suspicious activities using real-time intrusion detection systems (IDS) to prevent any unauthorized access or attacks.

8. Incident Response Plan

We have a formal Incident Response Plan (IRP) in place to ensure any security breach or incident is promptly identified, managed, and resolved.

9. Compliance with Regulations

Kuber TMS complies with local data protection laws, including GDPR, India's IT Act, and the data residency laws of India, KSA, and UAE. This ensures that your data is handled and processed in accordance with the highest legal standards.

10. No Data Sharing with Third Parties

We do not sell or share customer data with third-party companies for marketing or any other purposes. Customer data is only used to enhance your experience on our platform.

11. Secure Development Practices

Our software development follows secure coding practices, with all updates and new releases being thoroughly tested for vulnerabilities before deployment.

12. Data Retention Policy

Data is retained for as long as required to provide our services and comply with legal obligations. Data that is no longer needed is safely deleted.

13. Employee Training

All employees undergo regular security training to stay informed about the latest threats, phishing attempts, and social engineering tactics. This ensures they follow security best practices in their daily work.

14. Privacy by Design

We incorporate Privacy by Design principles into all our processes, ensuring that privacy and security are considered at every stage of product development.

Contact Us

If you have any questions or concerns about our security measures, please reach out to us at [email protected].

This policy covers a range of critical security measures that are feasible for smaller companies and communicates a clear commitment to data security.