Security Policy
Protecting Data and User Security
Last Updated: 17 Tetor 2025
1. Introduction
TeKafja takes advanced measures to ensure the security of its data and users. This policy describes our security measures.
2. Data Protection
Encryption
All data is encrypted during transmission and storage.
- SSL/TLS encryption for data transmission
- AES-256 encryption for data storage
- Encryption of backup copies
Access Control
We implement strict access controls to protect data.
- Two-factor authentication (2FA)
- Role-based access control
- Access and activity auditing
3. Secure Infrastructure
We use secure and monitored infrastructure.
Secure Servers
Servers protected with firewalls and 24/7 monitoring
Secure Network
Isolated and protected network with advanced technology
4. Security Monitoring
We continuously monitor systems to detect threats.
- Real-time monitoring
- Automated alerts
- Rapid incident response
- Regular security reports
5. User Security
Users must follow good security practices.
Secure Passwords
- Strong passwords with at least 8 characters
- Regular password changes
- Not sharing passwords with others
6. Incident Response
We have defined procedures for responding to security incidents.
Detection
Automated systems for threat detection
Response
Specialized team for rapid response
7. Compliance
We adhere to security standards and regulations.
- GDPR compliance
- ISO 27001 standards
- Regular security audits
8. Incident Reporting
If you discover a security issue, please contact us immediately.
Security incident contact: security@tekafja.com
9. Security Updates
We regularly update systems and software to protect against new threats.
10. Contact
For any questions regarding security, please contact us.
Email: info@tekafja.com
Need Help? Contact us via info@tekafja.com or by clicking here