Security Policy

Protecting Data and User Security

Last Updated: 17 Tetor 2025

1. Introduction

TeKafja takes advanced measures to ensure the security of its data and users. This policy describes our security measures.

2. Data Protection

Encryption

All data is encrypted during transmission and storage.

  • SSL/TLS encryption for data transmission
  • AES-256 encryption for data storage
  • Encryption of backup copies

Access Control

We implement strict access controls to protect data.

  • Two-factor authentication (2FA)
  • Role-based access control
  • Access and activity auditing

3. Secure Infrastructure

We use secure and monitored infrastructure.

Secure Servers

Servers protected with firewalls and 24/7 monitoring

Secure Network

Isolated and protected network with advanced technology

4. Security Monitoring

We continuously monitor systems to detect threats.

  • Real-time monitoring
  • Automated alerts
  • Rapid incident response
  • Regular security reports

5. User Security

Users must follow good security practices.

Secure Passwords

  • Strong passwords with at least 8 characters
  • Regular password changes
  • Not sharing passwords with others

6. Incident Response

We have defined procedures for responding to security incidents.

Detection

Automated systems for threat detection

Response

Specialized team for rapid response

7. Compliance

We adhere to security standards and regulations.

  • GDPR compliance
  • ISO 27001 standards
  • Regular security audits

8. Incident Reporting

If you discover a security issue, please contact us immediately.

Security incident contact: security@tekafja.com

9. Security Updates

We regularly update systems and software to protect against new threats.

10. Contact

For any questions regarding security, please contact us.

Email: info@tekafja.com

Need Help? Contact us via info@tekafja.com or by clicking here