Our customers trust us with access to sensitive and valuable data to do our jobs. We take this responsibility very seriously. This document outlines our policies for being responsible stewards of this data.
Please send any question or comments to firstname.lastname@example.org.
Last update: October 11, 2016 .
At MadKudu, we hold ourselves to a set of principles that guide every engineering and operational decision.
We treat your data like our data
We share our own internal business data with 3rd parties and expect them to adhere to a high level of security standards. We hold ourselves to this same level.
We follow industry best practices
The overwhelming majority of security issues can be avoided by following industry best practices: password policies, anti-virus software, encryption, access control. We adhere to them.
We review and update this security policy every quarter to ensure we are current with best practices.
Our last review was in September 2016. The next one will be in December 2016.
Data access is controlled on a need-to-know basis based on an employee's responsibilities.
Two-factor authentication is used for all cloud services when available.
All data in-transit is encrypted. We use https for all web app and API calls. SSL is used for all database queries. All third-party credentials are encrypted at-rest and in transit.
We don't share customer data with 3rd parties without a written agreement, with the exception of:
We only store the data we need and that is already available in other systems (analytics, CRM...).
We do not ask for Social Security Numbers, Credit Card informations, user passwords...
Data is immediately deleted when a customer cancels.
Customer data will be deleted upon request to email@example.com.
We perform background checks on all employees hired after 5/1/2016.
We conduct security training for each new employee and repeat it annually.
We install malware and anti-virus protection software whenever prudent based on risk and best practices.
We log accesses to all hosts and databases and retain access logs for a minimum of one year.
We will notify customers about any confirmed security or privacy breach as soon as possible. We provide assessment and mitigation reports within: