Skip to main content
Data Security Policy
Updated over a month ago

Version: TP.04032022.04

Effective date: 21/November/2024

Vansah has implemented and will maintain a robust information security program that employs appropriate physical, technical, and organizational measures designed to safeguard Customer Data against unauthorized access, destruction, manipulation, and disclosure.

1. Relationship to End User License Agreement (EULA)

This Data Security policy is subject to the terms and conditions set forth in the End User License Agreement (EULA).

2. Key Security Features

256-Bit SSL Encrypted Login

  • Ensures maximum security in data transfer

  • Prevents login and password theft

  • All communications to and from Vansah’s application are encrypted using bank-grade security protocols

3. Separation of Customer Data

  • Customer Data is partitioned to prevent data overlap and maintain data integrity

  • Customer Data is pinned based on your Jira location (see Data Residency)

4. Infrastructure and Monitoring

  • All systems are continuously monitored for security, availability, and performance

  • Vansah operates a highly scalable and redundant infrastructure

  • Backed by a 99.9% uptime service level agreement

5. Data Security Policy includes:

  1. Strict access controls (Regular access audits and prompt revocation of unnecessary privilege, Zero-trust architecture principles for network access)

  2. Advanced encryption protocols (AES-256 encryption for data at rest, TLS 1.3 for data in transit, End-to-end encryption for highly sensitive communications)

  3. Regular data backups (Automated, encrypted daily backups within same pinned region see Data Residency, Regular disaster recovery and business continuity testing)

  4. Employee training on data handling best practices (Annual security awareness training for all staff)

These measures are designed to minimize the risk of data breaches, unauthorized access, and data loss, thereby maintaining the trust of our customers in our commitment to data security.

6. Compliance and Audits

Vansah maintains a compliance program that includes:

  • Independent third-party audits

  • Adherence to industry standards (e.g., ISO 27001, NIST Cybersecurity Framework)

Further information about our security program is available upon request.

7. Data Residency

To view where your Vansah product and customer data is hosted please see our Data Residency policy

8. Continuous Improvement

We are committed to continuously improving our security measures. Our Data security policies and practices are regularly reviewed and updated to address new threats and comply with evolving industry standards.

By using our Software, you can be assured that we prioritize the security and integrity of your data, implementing best practices and cutting-edge technologies to safeguard your information.

9. Contact Information

If you have any questions about this policy , please contact us through our support portal.

Did this answer your question?