Security Policy

Last Updated: October 30, 2024

Introduction

At Pairenthesis ("we," "us," or "our"), we are committed to safeguarding the security of our AI-native, no-code data insights platform (the "Service") and the data processed within it. This Security Policy outlines the technical and organizational measures we implement to protect your data.

Access Control

  • User Authentication: Multi-factor authentication (MFA) is required for all administrative access.
  • Role-Based Access Control (RBAC): Permissions are granted based on the principle of least privilege.
  • Regular Access Reviews: Periodic audits of user access rights.

Data Security

  • Encryption in Transit: Data transmitted between you and the Service is encrypted using TLS 1.2+.
  • Encryption at Rest: Data stored on our servers is encrypted using AES-256 encryption.
  • Data Segmentation: Customer data is logically separated to prevent cross-access.

Network Security

  • Firewalls and Intrusion Detection: Use of firewalls and intrusion detection/prevention systems (IDS/IPS) to protect against unauthorized access.
  • Secure Network Architecture: Segmentation of networks to isolate sensitive systems.

Physical Security

  • Secure Data Centers: Our servers are hosted in data centers with 24/7 surveillance, biometric access controls, and redundant power supplies.
  • Environmental Controls: Protection against environmental hazards like fire and flooding.

Monitoring and Logging

  • Continuous Monitoring: Systems are monitored for security events and anomalies.
  • Audit Logs: Comprehensive logging of access and actions within the Service.
  • Log Retention: Logs are retained in accordance with our data retention policies.

Vulnerability Management

  • Regular Updates: Timely application of security patches and updates.
  • Vulnerability Scanning: Automated scanning tools to detect potential vulnerabilities.
  • Penetration Testing: Periodic third-party penetration tests to assess security posture.

Incident Response

  • Incident Response Plan: Established procedures for responding to security incidents.
  • Notification: Prompt notification to affected parties in the event of a data breach.
  • Recovery Procedures: Steps to restore services and data integrity following an incident.

Employee Security

  • Background Checks: Pre-employment screening of all personnel with access to sensitive data.
  • Security Training: Regular training on security best practices and policies.
  • Confidentiality Agreements: Binding agreements to protect confidential information.

Compliance and Standards

  • Regulatory Compliance: Adherence to applicable laws and regulations, including GDPR and CCPA.
  • Industry Standards: Alignment with industry best practices, such as ISO 27001 and NIST guidelines.

Third-Party Security

  • Vendor Assessments: Due diligence and security assessments of third-party service providers.
  • Contracts and Agreements: Inclusion of security and confidentiality obligations in vendor contracts.

Data Backup and Recovery

  • Regular Backups: Routine backups of critical data.
  • Disaster Recovery Plan: Established procedures for restoring services in the event of a major outage.

Secure Development Practices

  • Code Reviews: Peer reviews and static analysis of code for security vulnerabilities.
  • Secure Coding Standards: Adoption of secure coding guidelines (e.g., OWASP).

Contact Information

For security inquiries or to report a security incident: