Data Security Policy
1) Introduction
The BizRegistro Consultancy Services (BizRegistro, “We”, “Us” or “Our”) data security policy covers our Services and Websites located at www.bizregistro.com (hereinafter collectively referred to as “Service(s)”).We value the unwavering trust that our users place in us as custodians of their data. We understand our responsibility and take appropriate care to protect and secure your information seriously as described in our security practices below.
The terms “customer” “you” “your” “user” and “users” refer to all individuals and other persons who access or use our services, including, without limitation, any companies, organizations, or other legal entities that register accounts or otherwise access or use the Services through their respective employees, agents, or representatives.
2) Compliance
BizRegistro is compliant with the Payment Data Security Standards via the third-party payment providers we use and can therefore accept or process credit card information securely in accordance with these standards.3) Access Control
Access to our technology resources is only permitted through secure connectivity (for e. g. Https) and requires authentication. Our password policy requires complexity, expiration, lock out and disallows reuse. We grant access on a need to know on the basis of least privilege rules, reviews permissions quarterly, and revokes access immediately after employee termination.4) Security Policies
We review and update our security policies at least annually. Our employees are obligated to acknowledge policies on an annual basis and are provided training for assuring data security and job specific security and skill development for key job functions.5) Physical Security
Our information systems and technical infrastructure are hosted within world-class Data Center located in India. Physical security controls at our data centres include camera surveillance, visitor logs, security personnel.6) Personnel Screening
We conduct background research at the time of hire (to the extent permitted or facilitated by applicable laws and countries). In addition, we communicate our data security policies to all personnel (who must acknowledge this) and require new employees to sign non-disclosure agreements and provide ongoing privacy and security training.7) Penetration Testing and System Vulnerability Assessments
We have a vulnerability assessment program which includes periodic scans, identification, and remediation of security vulnerabilities on servers, network equipment, and applications. All networks, including test and production environments, are regularly scanned using trusted third-party vendors.We also conduct regular internal and external penetration tests and remediate according to severity for any results found.