Data security

Data Security Statement for Prompted

At Prompted, we prioritize the security and integrity of our users' data. We understand the importance of protecting the information entrusted to us and have implemented robust security measures to ensure that our SaaS-based application remains a safe and reliable environment for all users. This Data Security Statement outlines our commitment to safeguarding your data and the steps we take to maintain a high level of security.

  1. Data Storage and Encryption

All user data is stored in secure, geographically distributed data centers managed by reputable third-party service providers. These data centers employ state-of-the-art physical and environmental security controls, including 24/7 monitoring, access restrictions, and fire detection and suppression systems.

We use industry-standard encryption protocols to protect the confidentiality of your data, both in transit and at rest. All data transmitted between our servers and your devices is encrypted using Secure Socket Layer (SSL) or Transport Layer Security (TLS) technology, while data at rest is encrypted using Advanced Encryption Standard (AES) with a 256-bit key length.

  1. Access Controls and Authentication

We implement strict access controls to limit access to your data to only authorized personnel. Our team members are granted access to user data on a need-to-know basis, and their access levels are regularly reviewed and updated. All access to our systems is logged and audited to detect and prevent unauthorized activities.

User authentication is enforced through a secure and unique username-password combination. We encourage users to create strong, unique passwords and recommend using multi-factor authentication (MFA) to add an extra layer of security.

  1. Network Security and Monitoring

Our network infrastructure is designed with multiple layers of security, including firewalls, intrusion detection and prevention systems (IDPS), and traffic filtering to protect against unauthorized access and potential attacks.

We continuously monitor and analyze our systems for potential security threats, vulnerabilities, and suspicious activities. Our dedicated security team actively responds to any detected incidents and employs measures to mitigate risks and prevent future occurrences.

  1. Software Development and Maintenance

Our development team follows secure coding practices and guidelines to ensure that our application is built with security in mind. We conduct regular security reviews, vulnerability assessments, and penetration tests to identify and remediate potential weaknesses in our application.

We are committed to promptly addressing security vulnerabilities and providing regular updates and patches to our users. We encourage users to keep their software up-to-date to benefit from the latest security enhancements and improvements.

  1. Security Training and Awareness

We believe that a security-conscious workforce is essential in maintaining a strong security posture. Our team members receive regular security training and are kept informed of current threats, best practices, and company policies.

  1. Incident Response and Business Continuity

We have a comprehensive incident response plan in place to ensure prompt and effective action in the event of a security breach. Our team is prepared to identify, contain, and remediate any potential incidents to minimize their impact on our users and services.

In addition, we maintain a business continuity plan that includes data backup and disaster recovery procedures to ensure the availability and integrity of our services in case of unforeseen events or disruptions.

Your trust is of utmost importance to us, and we are committed to continually improving our security measures to protect your data. If you have any questions or concerns about our data security practices, please do not hesitate to contact us at ops@titus.one.