For additional information, please e-mail us at email@example.com
Ememozin.com is a highly secured platform and has undergone penetration testing from a reputed agency. Our information security management framework provides robust controls for data encryption, data backups, server hardening, intrusion detection, patch management, protection against cross scripting, SQL injection attacks, etc.
We will not use data for unlawful activities (such as child pornography, gambling, fraud, terrorist activities), sending unsolicited emails, for posting any material or transmitting any content that harasses, threatens the health and safety of our users or for posting any obscene, racist, indecent, malicious, harmful or violent content.
We store passwords in encrypted form.
- Access Control
Only authorized persons can access data and all access are based on the principle of least privilege i.e. access is based on the user role and no access is given beyond what the role demands.
- Information Security Organization
We have an information security and risk management committee headed by our CEO and with an independent board oversight.
- Data Backup
Data is backed up on a daily basis. All backups are protected by either 256 bit AES encryption (Symmetric) or 2048 bit RSA (Asymmetric) encryption.
- Confidentiality and Non-disclosure
We sign confidentiality and non-disclosure agreements with all our customers. Also, all our employees sign confidentiality and non-disclosure agreements in the interest of all.
- Employee Background Verification and Screening
We do not perform background verification as a policy. We often verify references, KYC proofs and make sure that potential team members fit our company values.
- Data Encryption
We deploy robust encryption techniques in order to secure legally/contractually restricted data (i.e. sensitive data). The encryption plan covers emails, desktop/laptop file systems, external storage media, data backups, transport level encryption and others.
- Patch Management
Our information technology assets (software, servers, desktops, and laptop computers owned and operated by ememozin.com) are properly patched with the latest appropriate updates in order to reduce system vulnerability and to enhance and repair application functionality.
- Server Hardening
We harden our operating system, application, database, web servers towards any unauthorized attacks.
- Cross Scripting and SQL Injections
Our technology stack, platform and code base are designed and deployed to prevent cross-scripting and SQL injection attacks.
- Data Testing
We do not use user data in our testing or development environment including § Uptime. We guarantee a 99.9% uptime of our systems except in the event of a natural disaster beyond our control.
- Network and Application Level Redundancy
Network level redundancy is managed by our hosting provider, Software Technologies, an SSAE16 certified provider. Application level redundancy is managed in-house including § IP Restrictions. We only allow authorized IPs to connect to our systems to enhance the security system.
- Ethics and Code of Conduct
Ememozin.com is a professionally run organization and follows ethical business practices.
- Penetration Testing
All our key applications have undergone penetration testing from a reputed agency.
- Data Retention
We retain data for a period specified in the contracts with our customers and comply with customer specific requirements. Our systems are capable of selective and automatic purging of sensitive data.
When you place orders or access your account information, we offer the use of a secure server. The Secure Server Software (SSL) encrypts all information you input before it is sent to us. Furthermore, all of the customer data we collect is protected against unauthorized access.
"Cookies" are small pieces of information that are stored by your browser on your computer's hard drive. Our cookies do not contain any personally identifying information, but they do enable us to provide features such as storing items in your order between visits. Most Web browsers automatically accept cookies, but you can usually change your browser to prevent that.
Change to the policy