Compliance & Security
Last Updated: January 4, 2026
1. Our Commitment to Compliance
At ETISONE, we are committed to maintaining the highest standards of security, privacy, and compliance. We understand that trust is earned through transparency and adherence to industry-leading practices and regulations.
2. Security Certifications & Standards
2.1 SOC 2 Type II Compliance
ETISONE maintains SOC 2 Type II certification, demonstrating our commitment to security, availability, processing integrity, confidentiality, and privacy.
2.2 ISO/IEC 27001
We follow ISO/IEC 27001 information security management standards to ensure systematic approach to managing sensitive information.
2.3 Data Encryption
We employ industry-standard encryption protocols:
- Data in Transit: TLS 1.3 encryption for all data transmitted over networks
- Data at Rest: AES-256 encryption for stored data
- End-to-End Encryption: Available for sensitive communications
3. Privacy Regulations
3.1 GDPR (General Data Protection Regulation)
For our European customers, we comply with GDPR requirements including:
- Right to access personal data
- Right to rectification
- Right to erasure ("right to be forgotten")
- Right to data portability
- Right to object to processing
- Data breach notification within 72 hours
3.2 CCPA (California Consumer Privacy Act)
We comply with CCPA requirements for California residents, including:
- Right to know what personal information is collected
- Right to delete personal information
- Right to opt-out of sale of personal information
- Right to non-discrimination for exercising privacy rights
3.3 India Data Protection Laws
We comply with India's Information Technology Act, 2000 and related data protection regulations.
4. Infrastructure Security
4.1 Cloud Security
Our infrastructure is built on enterprise-grade cloud platforms with:
- Multi-region redundancy
- Automated backups and disaster recovery
- DDoS protection
- Network isolation and segmentation
- 24/7 security monitoring
4.2 Access Controls
- Multi-factor authentication (MFA) required for all team members
- Role-based access control (RBAC)
- Principle of least privilege
- Regular access reviews and audits
4.3 Security Monitoring
- Real-time threat detection and response
- Intrusion detection systems (IDS)
- Continuous vulnerability scanning
- Security incident and event management (SIEM)
5. Application Security
5.1 Secure Development Lifecycle
We follow secure coding practices including:
- Code reviews and security assessments
- Automated security testing in CI/CD pipeline
- Penetration testing by third-party security experts
- Regular dependency and vulnerability scanning
5.2 API Security
- OAuth 2.0 and API key authentication
- Rate limiting and throttling
- Input validation and sanitization
- API versioning and deprecation policies
6. Data Protection & Privacy
6.1 Data Minimization
We collect only the data necessary to provide our services and fulfill business purposes.
6.2 Data Retention
We retain data only as long as necessary and in accordance with:
- Legal and regulatory requirements
- Contractual obligations
- Legitimate business purposes
6.3 Data Processing Agreements
We enter into Data Processing Agreements (DPAs) with customers as required by law and maintain Standard Contractual Clauses (SCCs) for international data transfers.
7. Business Continuity & Disaster Recovery
7.1 Uptime Guarantee
We maintain a 99.9% uptime SLA with redundant systems and failover mechanisms.
7.2 Backup Strategy
- Automated daily backups
- Geo-redundant storage
- Regular backup restoration testing
- Point-in-time recovery capabilities
7.3 Incident Response
We maintain a comprehensive incident response plan with:
- 24/7 security operations center (SOC)
- Defined escalation procedures
- Regular incident response drills
- Post-incident analysis and improvements
8. Employee Security
8.1 Background Checks
All employees undergo background verification before joining.
8.2 Security Training
Mandatory security awareness training for all employees including:
- Phishing and social engineering awareness
- Data protection best practices
- Secure coding practices (for developers)
- Incident reporting procedures
8.3 Confidentiality
All employees sign confidentiality and non-disclosure agreements.
9. Third-Party Security
9.1 Vendor Assessment
We conduct security assessments of all third-party vendors and service providers.
9.2 Sub-processor Management
We maintain a list of approved sub-processors and conduct regular reviews.
10. Audit & Reporting
10.1 Regular Audits
- Annual SOC 2 Type II audits
- Quarterly internal security audits
- Regular penetration testing
- Compliance audits as required
10.2 Transparency Reports
We publish annual transparency reports detailing:
- Security incidents and resolutions
- Data requests from authorities
- Compliance updates
- Service availability metrics
11. Customer Responsibilities
Security is a shared responsibility. Customers are responsible for:
- Maintaining secure passwords and credentials
- Configuring access controls appropriately
- Monitoring their account activity
- Reporting security incidents promptly
- Following security best practices
12. Reporting Security Issues
If you discover a security vulnerability or incident, please report it immediately:
- Security Email: contact@etisone.com (Subject: Security Issue)
- WhatsApp: +91 8080718085
We appreciate responsible disclosure and will work with security researchers to address reported vulnerabilities.
13. Compliance Updates
We continuously monitor changes in regulations and industry standards. This page is regularly updated to reflect our current compliance status.
14. Contact Our Compliance Team
For questions about our compliance program, please contact:
- Email: contact@etisone.com
- WhatsApp: +91 8080718085