Security

Gravyty is committed to following stringent security policies and procedures to protect the assets,data and information of Gravyty, Gravyty’s clients and Gravyty platform users.
We present our current policies and procedures below.

Acceptable Use Policy

We maintain a comprehensive Acceptable Use Policy which is communicated to all our employees and contractors and enforced accordingly.

Version No: 1.1

E-mail + Internet Security Policy

Our e-mail and internet usage is managed in a secure and responsible manner.

Version No: 1.2

Encryption Policy

We use the industry standard encryption technologies to protect data across our systems.

Version No: 1.4

Incident Management Policy

In the unlikely event of a security incident, our incident response procedures ensure that weaknesses are identified, reported and swiftly mitigated

Version No: 1.1

Information Security Policy

Our information security practices incorporate industry-recognized best practices for protecting data and preventing security breaches.

Version No: 1.2

Metadata Protection Policy

We protect all our metadata to prevent personal data being compromised.

Version No: 1.4

Network/Server Security Policy

All data is protected as it is transferred around our secure network.

Version No: 1.1

Password Security Policy

Our strong password policy governs passwords across our systems preventing unauthorized access.

Version No: 1.2

Workstation Security Policy

Our employees follow a meticulous policy to prevent loss of sensitive information and assets.

Version No: 1.4