Security

Your security is our top priority

Last updated: January 1, 2025

Our Security Commitment

At Nedati Technologies Private Limited, we understand that the security of your data is paramount. We are committed to implementing and maintaining the highest standards of security to protect your information and ensure the integrity of our Kindflow service.

This Security page outlines our comprehensive approach to security, including the measures we take to protect your data, our compliance certifications, and how you can help maintain security when using our Service.

Infrastructure Security

Cloud Infrastructure

Our infrastructure is hosted on industry-leading cloud providers that maintain:

  • SOC 2 Type II certification
  • ISO 27001 compliance
  • 24/7 physical security at data centers
  • Redundant power and network connectivity
  • Geographic distribution for disaster recovery
  • Regular third-party security audits

Network Security

We implement multiple layers of network protection:

  • Web Application Firewall (WAF) protection
  • DDoS mitigation and protection
  • Intrusion detection and prevention systems
  • Network segmentation and isolation
  • Virtual Private Cloud (VPC) deployment
  • Regular security scanning and monitoring

Data Security

Encryption

We use industry-standard encryption to protect your data:

  • In Transit: All data transmitted between your browser and our servers is encrypted using TLS 1.3 with strong cipher suites
  • At Rest: All stored data is encrypted using AES-256 encryption
  • Database Encryption: Full database encryption with encrypted backups
  • Key Management: Secure key management using industry best practices

Data Backup and Recovery

We maintain comprehensive backup and disaster recovery procedures:

  • Automated daily backups with point-in-time recovery
  • Geographically distributed backup storage
  • Regular backup restoration testing
  • Documented disaster recovery procedures
  • Recovery Time Objective (RTO) of less than 4 hours
  • Recovery Point Objective (RPO) of less than 1 hour

Application Security

Secure Development Practices

Our development process incorporates security at every stage:

  • Security-focused code reviews
  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Dependency vulnerability scanning
  • Regular security training for developers
  • Secure coding standards and guidelines

Authentication and Access Control

We implement robust authentication mechanisms:

  • Multi-factor authentication (MFA) support
  • Strong password requirements
  • Account lockout policies
  • Session timeout controls
  • Role-based access control (RBAC)
  • Single Sign-On (SSO) integration options
  • OAuth 2.0 and SAML support

Operational Security

Access Management

We strictly control access to production systems:

  • Principle of least privilege access
  • Regular access reviews and audits
  • Immediate revocation upon employee departure
  • Privileged access management (PAM)
  • Comprehensive audit logging
  • Background checks for all employees

Monitoring and Logging

We maintain comprehensive monitoring systems:

  • 24/7 security monitoring and alerting
  • Security Information and Event Management (SIEM)
  • Anomaly detection and behavioral analysis
  • Comprehensive audit trails
  • Log retention for compliance requirements
  • Real-time threat intelligence feeds

Compliance and Certifications

We maintain compliance with industry standards and regulations:

  • GDPR: General Data Protection Regulation compliance
  • IT Act 2000: Indian Information Technology Act compliance
  • ISO 27001: Information Security Management System (in progress)
  • SOC 2 Type II: Security, Availability, and Confidentiality (planned)
  • PCI DSS: Payment Card Industry Data Security Standard

We regularly undergo third-party security assessments and penetration testing to validate our security controls.

Incident Response

We have a comprehensive incident response plan that includes:

  • Dedicated incident response team
  • 24/7 incident detection and response
  • Defined escalation procedures
  • Communication protocols for affected users
  • Post-incident analysis and improvements
  • Regular incident response drills

In the event of a security incident affecting your data, we commit to notifying you within 72 hours of discovery, in compliance with applicable regulations.

Security Best Practices for Users

Help us keep your account secure by following these best practices:

Account Security

  • Use a strong, unique password for your Kindflow account
  • Enable multi-factor authentication (MFA)
  • Never share your login credentials
  • Regularly review your account activity
  • Update your password periodically
  • Use a password manager

Device Security

  • Keep your operating system and browser updated
  • Use antivirus software
  • Avoid using public Wi-Fi without a VPN
  • Lock your device when not in use
  • Enable automatic screen locks

Phishing Prevention

  • Verify sender addresses in emails claiming to be from us
  • We will never ask for your password via email
  • Check for HTTPS and our domain before entering credentials
  • Report suspicious emails to us
  • Enable email authentication (SPF, DKIM, DMARC)

Vulnerability Disclosure Program

We welcome security researchers to help us maintain the security of our Service. If you discover a vulnerability:

  • Email us at security@kindflow.ai with details
  • Include steps to reproduce the vulnerability
  • Allow us reasonable time to address the issue
  • Do not access or modify user data
  • Do not perform denial of service attacks

We commit to acknowledging your report within 48 hours and keeping you informed of our progress. We appreciate responsible disclosure and may offer recognition or rewards for significant findings.

Data Retention and Deletion

We retain data only as long as necessary and provide secure deletion:

  • Data retention policies aligned with legal requirements
  • Secure data deletion upon account termination
  • Cryptographic erasure for sensitive data
  • Regular purging of unnecessary data
  • Data portability options for users

Third-Party Security

We carefully vet all third-party services and require them to:

  • Maintain appropriate security certifications
  • Sign data processing agreements
  • Implement adequate security controls
  • Undergo regular security assessments
  • Notify us of any security incidents
  • Comply with our security requirements

Reporting Security Concerns

If you have any security concerns or suspect unauthorized access to your account:

Immediate Action Required:

  • Change your password immediately
  • Review your account activity
  • Contact us at security@kindflow.ai
  • Include as much detail as possible

Contact Our Security Team

For security-related inquiries or to report vulnerabilities:

Security Team

Nedati Technologies Private Limited
Email: security@kindflow.ai
Emergency Hotline: +91 9654275909
Address: Ghaziabad, Uttar Pradesh, India

For general privacy inquiries: privacy@kindflow.ai
For general support: support@kindflow.ai