Scroll to top

Security Policy


At Conneqtion, we have restricted access for all our users. Only employees who are authorised to see client data have access to it. Audit policies require every access to customer data to be logged. In terms of securing sensitive and organisational data, all our employees and contract people stick to our Information Security Policies.

Employee Practices

All employees we hire goes thorough background checks before employment. Conneqtion also makes sure all employees go through set of privacy and security training during onboarding as well as on time-to-time basis. All employees are required to read and sign non-disclosure agreement covering the security, availability, and confidentiality of our services.

Network Protection

The perimeter firewall has been configured in accordance with industry best practises to monitor incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Incident Response and Recovery Plan

Conneqtion annually tests its Business Continuity, Disaster Recovery, and Incident Response and Recovery Plans and immediately acts on its results to avoid any business discontinuity.

Data Encryption

Conneqtion implements industry-standard encryption protocols and cipher suites. All production systems regularly get monitored to avoid any weak encryption.

Penetration testing and vulnerability assessment

All operational systems and applications are routinely subjected to vulnerability assessments and penetration tests. This is carried out both internally and via a security vendor from a third party.

Data Loss Prevention (DLP)

Endpoint security is deployed on every system. A weekly process is established to identify non-compliant devices, and a prompt action is taken on those devices.