Logo

Security Policy

1. Overview

At Gedexo Technologies, we are committed to providing digital services of the highest quality while prioritizing the security and privacy of our clients, partners, and stakeholders. This Security Policy outlines our dedication to maintaining the confidentiality, integrity, and availability of information, systems, and services.

2. Information Security Governance

2.1. Responsibilities

  • Executive Leadership: The leadership team at Gedexo Technologies is responsible for establishing and maintaining an effective information security program.

  • Employees: All employees are accountable for adhering to security policies and reporting any security concerns promptly.

2.2. Risk Management

We regularly assess and mitigate information security risks to ensure the resilience of our digital infrastructure and services.

3. Data Protection

3.1. Data Classification and Handling

  • Sensitive Data: We classify and handle sensitive data according to its level of sensitivity, ensuring appropriate safeguards are in place.

  • Data Access: Access to sensitive information is restricted to authorized personnel only.

4. Access Control

4.1. User Authentication

  • We enforce strong authentication mechanisms to control access to our systems and data.

  • User access is granted based on the principle of least privilege.

5. Network Security

5.1. Firewalls and Intrusion Detection

  • Our network is protected by firewalls and intrusion detection systems to monitor and prevent unauthorized access.

6. Incident Response

6.1. Reporting Incidents

  • Employees are required to report any suspected or confirmed security incidents promptly.

  • We maintain an incident response plan to efficiently address and mitigate the impact of security incidents.

7. Training and Awareness

7.1. Employee Training

  • All employees undergo regular security awareness training to stay informed about potential threats and best practices.

8. Compliance

We adhere to relevant data protection laws and industry regulations, regularly reviewing and updating our security policies to remain in compliance.

9. Continuous Improvement

Our commitment to security includes an ongoing effort to identify areas for improvement and to adapt our security measures to address emerging threats.

By engaging with Gedexo Technologies, clients can trust that their digital assets are in secure hands. We are dedicated to maintaining the highest standards of information security to safeguard the interests of our clients and stakeholders.

For any questions or concerns regarding our security practices, please contact us at contact@gedexo.com.

Gedexo Technologies Near Calicut International Airport, Kerala, India Contact Information: contact@gedexo.com Date of Last Update: 20/11/2021


Please ensure that you review the policy to make sure it aligns with your specific practices and regulations. Additionally, consider consulting with legal and cybersecurity professionals for a thorough review.