We take protecting your sensitive financial data seriously. Learn about our security practices and commitment to your trust.
Your data is protected with military-grade encryption, both in transit and at rest.
All data transmitted between your devices and Oditfy servers is encrypted using TLS 1.2 or higher.
Data stored in our systems is encrypted using AES-256 encryption.
We follow industry best practices for cryptographic key management, with keys stored securely and rotated regularly.
Built on reliable, secure cloud infrastructure with redundancy and monitoring.
Hosted on enterprise-grade cloud infrastructure with high availability, automatic backups, and disaster recovery.
Continuous infrastructure monitoring for anomalies, threats, and performance issues.
Continuous automated backups with point-in-time recovery ensure data durability and business continuity.
Strict controls ensure only authorized users can access data.
Principle of least privilege ensures users only access data necessary for their role.
MFA for all accounts, requiring a second verification method beyond passwords.
Secure SSO via Google and Microsoft, leveraging enterprise-grade authentication.
Your data is logically separated and never commingled with other customers.
Database-level segregation and application-level controls for customer data.
Strict separation between customer datasets. Your records are never visible to other organizations.
Regular audits and tests to ensure no cross-tenant data leakage.
Built with privacy-first principles and responsible data handling.
Privacy considerations are embedded into our product architecture and development process from the ground up.
We collect and retain only the data necessary to deliver our services, reducing exposure and risk.
We support data access, correction, and deletion requests for all users regardless of jurisdiction.
Dedicated incident response plan with timely notification.
Security team ready to respond to any suspected or confirmed incidents immediately.
In the event of a breach, we notify you within timeframes required by applicable law.
Detailed logs of all incidents, remediation steps, and preventive measures.
We carefully vet all third-party service providers.
Thorough security assessments of all third-party vendors before they access customer data.
All vendors have signed DPAs guaranteeing data protection and compliance.
Ongoing monitoring of vendor security posture and compliance certifications.
We welcome security researchers and encourage responsible disclosure.
Report security vulnerabilities to security@oditfy.com.
We acknowledge vulnerability reports within 24 hours and provide a remediation timeline.
We work in good faith with security researchers and may offer recognition.
We're happy to discuss our security practices, provide additional documentation, or answer any concerns.
Contact Our Security Team