Quick Contact

Data Security

We have an Information Security Management System (ISMS) in place which takes into account our security objectives and the risks and mitigations concerning all the interested parties. We employ strict policies and procedures encompassing the security, availability, processing, integrity, and confidentiality of customer data.

Data Encryption

Sagar Informatics Pvt. Ltd. (SIPL) use encryption technologies to protect data both in transit and at rest. This ensures that sensitive customer information, such as payment details and personal identifiers, remains secure.

Access Control

We restrict access to customer data by implementing role-based access controls. Only authorized personnel have access to sensitive information, and access is monitored and audited.

Firewalls and Intrusion Detection Systems

SIPL have employed firewalls and intrusion detection systems that helps safeguard against unauthorized access to the company's network and customer data.

Regular Security Audits and Vulnerability Assessments

We conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in the systems and processes.

Secure Storage

Customer data is securely stored in databases or cloud environments that are designed with security in mind. Data centers are often equipped with physical security measures as well.

Employee Training

Employees are trained on data security best practices and privacy regulations. They are educated about the importance of safeguarding customer information and maintaining confidentiality.

Privacy Policies

We have privacy policies that outline how we collect, use, and protect customer data. These policies are transparent about data handling practices and provide information on customer rights.

Data Backup and Recovery

Regular data backups and disaster recovery plans ensure that customer data can be restored in the event of data loss or a security breach.

Internal audit and compliance

We have a dedicated compliance team to review procedures and policies to align them with standards, and to determine what controls, processes, and systems are needed to meet the standards.This team also does periodic internal audits and facilitates independent audits and assessments by third parties.

Endpoint security

All workstations issued to Sagar Informatics Pvt. Ltd. employees run up-to-date OS version and are configured with anti-virus software. They are configured such that they comply with our standards for security, which require all workstations to be properly configured, patched, and be tracked and monitored by SIPL’s endpoint management solutions. These workstations are secure by default as they are configured to encrypt data at rest, have strong passwords, and get locked when they are idle. Mobile devices used for business purposes are enrolled in the mobile device management system to ensure they meet our security standards.

Responsible Disclosure

We are committed to working with the community to verify, reproduce, respond to, legitimate, and implement appropriate solutions for the reported vulnerabilities.

If you happen to find any, please submit the issues at www.sagarinfotech.com

Anyone who believes there is a violation of the policies above is encouraged to update us at info@sagarinfotech.com