Trust & Compliance

Data Security &
Confidentiality

Protecting your sensitive financial data with enterprise-grade security measures, strict confidentiality protocols, and comprehensive access controls.

Data Encryption

All client data is protected with industry-standard encryption at every stage — at rest, in transit, and during processing. We ensure your financial data is never exposed to unauthorized access.

AES-256 Encryption at Rest

All stored data is encrypted using AES-256 standard — the same encryption used by governments and financial institutions worldwide.

TLS 1.3 In Transit

All data transfers use TLS 1.3 encryption, ensuring end-to-end protection during file uploads, emails & communications.

Encrypted File Sharing

No plain-text email attachments. All files are shared via encrypted channels — password-protected portals or secure cloud platforms.

Secure Cloud Storage

Data hosted on enterprise-grade cloud platforms (AWS / Google Cloud / Azure) with redundancy and disaster recovery.

NDA Policy

We sign comprehensive Non-Disclosure Agreements before every engagement to ensure legal protection of your sensitive information. Our NDA framework covers all stakeholders involved in the engagement.

Mutual NDA Before Engagement

A mutual NDA is signed by both parties before any data is exchanged, establishing clear confidentiality obligations from day one.

Covers All Staff & Contractors

Every team member — employees, contractors, and sub-contractors — who handles your data is bound by individual confidentiality agreements.

Perpetual Confidentiality

Confidentiality obligations survive the end of the engagement indefinitely. Your data remains protected even after the contract concludes.

Legal Jurisdiction Clause

NDAs include governing law and jurisdiction clauses aligned with the client's preferred legal framework (Indian, UK, UAE, or US law).

Restricted Access Controls

Access to client data is strictly controlled through role-based permissions, multi-factor authentication, and comprehensive audit trails. Only authorized personnel can access specific client information.

Role-Based Access (RBAC)

Team members only access data relevant to their assigned tasks. No one gets blanket access to all client data.

Multi-Factor Authentication

All systems require MFA (password + OTP/biometric) for login. No single-factor access is permitted for any production system.

Comprehensive Audit Trails

Every data access, modification, and download is logged with timestamps and user IDs for full traceability and accountability.

Clean Desk & Secure VPN

Mandatory clean-desk policy in all offices. Remote workers connect exclusively through encrypted VPN tunnels with endpoint protection.

Confidentiality Policy

Our comprehensive confidentiality framework governs how sensitive information is classified, handled, stored, and eventually disposed of — ensuring regulatory compliance and client trust at every step.

Information Classification

All data is classified into 4 tiers: Public, Internal, Confidential, and Restricted — with handling rules defined for each level.

Data Retention & Deletion

Defined retention schedules based on regulatory requirements. Secure deletion (DoD 5220.22-M standard) upon retention period expiry or client request.

Incident Response

Documented incident response procedures with defined escalation paths. Clients are notified within 24 hours of any security incident affecting their data.

Annual Security Training

All staff undergo mandatory annual security awareness training covering phishing, data handling, password management & social engineering.

Standards & Frameworks

Our security practices align with international standards and regulatory frameworks.

ISO 27001 Ready

Information Security Management System aligned with ISO 27001 controls

GDPR Awareness

Data handling practices aligned with EU General Data Protection Regulation principles

SOC 2 Aligned

Security, availability, and confidentiality controls aligned with SOC 2 Type II principles

IT Act 2000

Full compliance with India's Information Technology Act, 2000 and its subsequent amendments

Request Our NDA

Ready to engage? We'll share our standard NDA for your review. Customizations are welcome based on your specific requirements.