Security Policy

Last Updated: 4th March 2025

Data Encryption Practices

We comply with industry-leading encryption standards to keep your data secure, including:

🔹 End-to-End Encryption (E2EE) – All data transmitted between your device and our servers is encrypted using TLS (Transport Layer Security).

🔹 Encrypted Storage – Sensitive information, including receipts and payment details, is stored using AES-256 encryption, ensuring only authorized users can access it.

Authentication & Account Security

We have implemented some strict authentication measures to prevent unauthorised access. 

✅Session Management – Automatic log out after a short inactivity to secure your account.

✅Password Encryption – To prevent unauthorised access, we store user credentials securely.

Measures to Prevent Data Breaches

We take proactive steps to protect against cyber threats and data breaches:

🔒Access Controls – According to the principle of least privilege (PoLP), only authorised personnel gain access to sensitive data.

🔒Real-Time Monitoring – Our security team suspects and takes strict action against suspicious activity. 

🔒Regularly Security Audits – We perform vulnerability assessments and multiple tests to identify potential risks.

Contact Us

If you encounter any unauthorised access, please contact us immediately:

📧 Email: [Your Support Email]

📞 Phone: [Your Contact Number]

Policy Updates

We may change our policy from time to time. We request that our users review these policies periodically.

Note: By using our website, you consent to our security policy terms.