ETISONE
  • Industries
  • Technologies
  • Network
  • Support
Login
ETISONE
  • Industries
  • Technologies
  • Network
  • Support
  • Login

Compliance & Security

Last Updated: January 4, 2026

1. Our Commitment to Compliance

At ETISONE, we are committed to maintaining the highest standards of security, privacy, and compliance. We understand that trust is earned through transparency and adherence to industry-leading practices and regulations.

2. Security Certifications & Standards

2.1 SOC 2 Type II Compliance

ETISONE maintains SOC 2 Type II certification, demonstrating our commitment to security, availability, processing integrity, confidentiality, and privacy.

2.2 ISO/IEC 27001

We follow ISO/IEC 27001 information security management standards to ensure systematic approach to managing sensitive information.

2.3 Data Encryption

We employ industry-standard encryption protocols:

  • Data in Transit: TLS 1.3 encryption for all data transmitted over networks
  • Data at Rest: AES-256 encryption for stored data
  • End-to-End Encryption: Available for sensitive communications

3. Privacy Regulations

3.1 GDPR (General Data Protection Regulation)

For our European customers, we comply with GDPR requirements including:

  • Right to access personal data
  • Right to rectification
  • Right to erasure ("right to be forgotten")
  • Right to data portability
  • Right to object to processing
  • Data breach notification within 72 hours

3.2 CCPA (California Consumer Privacy Act)

We comply with CCPA requirements for California residents, including:

  • Right to know what personal information is collected
  • Right to delete personal information
  • Right to opt-out of sale of personal information
  • Right to non-discrimination for exercising privacy rights

3.3 India Data Protection Laws

We comply with India's Information Technology Act, 2000 and related data protection regulations.

4. Infrastructure Security

4.1 Cloud Security

Our infrastructure is built on enterprise-grade cloud platforms with:

  • Multi-region redundancy
  • Automated backups and disaster recovery
  • DDoS protection
  • Network isolation and segmentation
  • 24/7 security monitoring

4.2 Access Controls

  • Multi-factor authentication (MFA) required for all team members
  • Role-based access control (RBAC)
  • Principle of least privilege
  • Regular access reviews and audits

4.3 Security Monitoring

  • Real-time threat detection and response
  • Intrusion detection systems (IDS)
  • Continuous vulnerability scanning
  • Security incident and event management (SIEM)

5. Application Security

5.1 Secure Development Lifecycle

We follow secure coding practices including:

  • Code reviews and security assessments
  • Automated security testing in CI/CD pipeline
  • Penetration testing by third-party security experts
  • Regular dependency and vulnerability scanning

5.2 API Security

  • OAuth 2.0 and API key authentication
  • Rate limiting and throttling
  • Input validation and sanitization
  • API versioning and deprecation policies

6. Data Protection & Privacy

6.1 Data Minimization

We collect only the data necessary to provide our services and fulfill business purposes.

6.2 Data Retention

We retain data only as long as necessary and in accordance with:

  • Legal and regulatory requirements
  • Contractual obligations
  • Legitimate business purposes

6.3 Data Processing Agreements

We enter into Data Processing Agreements (DPAs) with customers as required by law and maintain Standard Contractual Clauses (SCCs) for international data transfers.

7. Business Continuity & Disaster Recovery

7.1 Uptime Guarantee

We maintain a 99.9% uptime SLA with redundant systems and failover mechanisms.

7.2 Backup Strategy

  • Automated daily backups
  • Geo-redundant storage
  • Regular backup restoration testing
  • Point-in-time recovery capabilities

7.3 Incident Response

We maintain a comprehensive incident response plan with:

  • 24/7 security operations center (SOC)
  • Defined escalation procedures
  • Regular incident response drills
  • Post-incident analysis and improvements

8. Employee Security

8.1 Background Checks

All employees undergo background verification before joining.

8.2 Security Training

Mandatory security awareness training for all employees including:

  • Phishing and social engineering awareness
  • Data protection best practices
  • Secure coding practices (for developers)
  • Incident reporting procedures

8.3 Confidentiality

All employees sign confidentiality and non-disclosure agreements.

9. Third-Party Security

9.1 Vendor Assessment

We conduct security assessments of all third-party vendors and service providers.

9.2 Sub-processor Management

We maintain a list of approved sub-processors and conduct regular reviews.

10. Audit & Reporting

10.1 Regular Audits

  • Annual SOC 2 Type II audits
  • Quarterly internal security audits
  • Regular penetration testing
  • Compliance audits as required

10.2 Transparency Reports

We publish annual transparency reports detailing:

  • Security incidents and resolutions
  • Data requests from authorities
  • Compliance updates
  • Service availability metrics

11. Customer Responsibilities

Security is a shared responsibility. Customers are responsible for:

  • Maintaining secure passwords and credentials
  • Configuring access controls appropriately
  • Monitoring their account activity
  • Reporting security incidents promptly
  • Following security best practices

12. Reporting Security Issues

If you discover a security vulnerability or incident, please report it immediately:

  • Security Email: contact@etisone.com (Subject: Security Issue)
  • WhatsApp: +91 8080718085

We appreciate responsible disclosure and will work with security researchers to address reported vulnerabilities.

13. Compliance Updates

We continuously monitor changes in regulations and industry standards. This page is regularly updated to reflect our current compliance status.

14. Contact Our Compliance Team

For questions about our compliance program, please contact:

  • Email: contact@etisone.com
  • WhatsApp: +91 8080718085

15. Related Resources

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

"Patience. Karma. Dharma."

Careers Investor Relations
Privacy Policy Terms of Use Sales Policy Legal Security

© 2026 Etisone. A brand of Eternaltech Innovations and Solutions Private Limited. All rights reserved.

India