🟢Database Encryption. All databases are encrypted at rest with AES-256, block-level storage encryption. For sensitive fields, we implement application-level encryption.
🟢Data transmission encrypted. The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.
Secure Authentication and Access Control
🟢Remote access security enforced. We require employees and some users to verify their identity using MFA before accessing systems.
🟢Role-based access control system restricts data access to authorized personnel only.
Privacy Protection
🟢Data Protection. We clearly define in your Privacy Policy how user data is used, stored, and protected. We collect only the data absolutely necessary for platform functionality.
🟢Compliance with Data Protection Laws. We comply with relevant data protection laws, including GDPR and similar regulations.
Regular Security Audits
🟢Frequent Security Audits and Vulnerability Assessments. We conduct routine internal reviews of your security measures, including software updates and access controls.
Data Backup and Disaster Recovery
🟢Automated Backup Schedule. We implement tools to automate data backups on a regular basis. Backups are encrypted (AES-256) to protect data during storage.
🟢Disaster Recovery Plan (DRP). We've developped a documented plan for responding to disasters, including roles, recovery procedures, and priorities.
User Control and Transparency
🟢Account Management. Users can manage their data, including requesting or deleting their account information.
🟡Data Access Tools. We aim to provide users with dashboards to view and manage their data.
🟢Public Documentation. We maintain up-to-date Privacy Policy and Terms of Service explaining data handling practices.
Compliance with Industry Standards
🟡Gap Analysis. We are conducting an initial assessment to identify gaps in meeting these standards.
🔴Implementation Roadmap. Follow a structured plan to achieve compliance, including implementing required controls.
🔴Third-Party Certification. Work with certified auditors to validate compliance with ISO 27001.
Commitment to Ongoing Improvement
🟢Threat Intelligence. BeSavvy constantly evolves security practices in response to emerging threats.
🟢Continuous Updates. BeSavvy updates security measures based on new innovations in the field.
Clear Privacy Policy and Terms
🟢Privacy Policy. Clearly outline data collection, usage, and sharing policies.
🟢Terms of Service. Define user responsibilities and platform commitments, ensuring both parties understand their obligations.
We publish posts and reels on Instagram, write threads on Twitter and sometimes post videos on Youtube.