The toughest privacy and security law in the world. Drafted and passed by the European Union (EU), it imposes obligations onto organizations when the data pertains to people in the EU. Violations of GDPR privacy and security standards mean heavy fines and penalties for the entities involved. From conducting information audit and encryption - pseudonymization - anonymization of data wherever possible to having a designated resource to ensure GDPR compliance and having transparent privacy policy for the users, GDPR is as exacting as it sounds.
CCPA is modeled after GDPR, to protect the interests of Californian residents. It requires organizations to be transparent about their data collection and usage practices, to respond to consumer requests, and to implement reasonable security measures to protect user data. Key provisions in CCPA include right to know, right to delete, right to opt-out, right to limit use and disclosure of sensitive personal information, private right of action, and privacy policy disclosure. Apart from geographic coverage, CCPA differs from GDPR in its scope - while GDPR does not apply to personal data used for personal activities, CCPA applies to use of personal data relating to a household or device
When it comes to data and security, we go the extra mile by ensuring that our software partners policies also align to the best intentions.
Your privacy is our priority. This Privacy Policy outlines how we use and protect your data—so you can trust not only our technology, but also our commitment to safeguarding your information and our relationship.
Data Privacy: Sensitive company information handled during discovery and extraction processes will be protected in accordance with data privacy regulations. Only necessary data will be processed and stored, adhering to the principle of data minimization. Information pertaining to delivered consignments shall be expunged immediately upon receipt of client authorization
Data Encryption: All data transmitted via the API will be encrypted using industry-standard protocols such as TLS (Transport Layer Security) to ensure secure communication between OptiSol and your organization’s platform. Both in-transit and at-rest data will be protected to prevent unauthorized access.
Access Control and Authentication: OptiSol will implement secure access control mechanisms enabling rolebased access to the API. Multi-factor authentication (MFA) and token-based authorization will ensure that only authorized users and systems can interact with the API.
API Gateway Security: Amazon API Gateway will be configured with rate-limiting, throttling, and security policies to prevent malicious attacks, safeguard against overuse or abuse of the API and maintain system integrity.
Monitoring and Incident Response: AWS CloudWatch will be used to continuously monitor API usage, traffic patterns, and potential security anomalies. Alerts will be set up for any unusual activity, and incident response protocols will be in place for quick mitigation of any security threats