Pulz.io Data Security Policy
Effective Date: September 5, 2024
Pulz.io is committed to protecting the security of our customers’ data. This Data Security Policy outlines the security measures we implement to safeguard personal data and Customer Content processed through our platform. Our goal is to ensure the confidentiality, integrity, and availability of data entrusted to us.
1. Security Measures
1.1 Encryption
We use industry-standard encryption protocols to protect data in transit and at rest, including HTTPS for secure communication and AES-256 encryption for stored data.
1.2 Access Controls
Access to data is strictly controlled and limited to authorized personnel based on the principle of least privilege. Role-based access ensures that only those who need access to perform their job functions can view sensitive information.
1.3 Secure Development Practices
Our development processes include secure coding practices, code reviews, and testing to identify and mitigate vulnerabilities during deployment.
1.4 Isolated Environments
Testing and production environments are kept separate to ensure that sensitive data is used only within secure, controlled settings.
2. Subprocessor Management
2.1 Selection and Oversight
Pulz.io selects subprocessors, such as cloud service providers, based on their security practices and compliance with applicable data protection laws. For a current list of subprocessors, please refer to our Subprocessors List.
2.2 Data Processing Agreements
We work with subprocessors who adhere to data protection standards that align with Pulz.io’s obligations under our Data Processing Addendum.
3. Personnel Security
3.1 Confidentiality Agreements
All Pulz.io staff, including employees, contractors, and other personnel, are required to sign confidentiality agreements to protect sensitive data and maintain confidentiality.
3.2 Awareness of Security Best Practices
Pulz.io ensures that all personnel are aware of security best practices to help them handle data responsibly.
4. Monitoring and Review
4.1 System Monitoring
Pulz.io conducts regular checks of its systems for any unusual activity. Our personnel review system logs periodically and address any identified issues to maintain security.
5. Data Retention and Disposal
5.1 Retention Policies
Data is retained only for as long as necessary to fulfill the purposes outlined in our Privacy Policy and Terms and Conditions. Once data is no longer required, it is securely deleted.
5.2 Secure Disposal
Sensitive data is securely disposed of using appropriate methods to ensure it cannot be reconstructed or retrieved.
6. Reporting Security Concerns
If you have any questions or concerns about Pulz.io’s security measures or suspect a security vulnerability, please contact us at contact@pulz.io.