Skip to main content

Security

At Streamlime, we take the security of our users’ data very seriously. We are committed to maintaining the confidentiality, integrity, and availability of all information processed and stored within our systems. Our security policy is designed to protect our users and their data from unauthorised access, use, disclosure, and destruction.

Access Control:

We maintain strict access controls to ensure that only authorised personnel have access to our systems and data. Access is granted on a need-to-know basis and is based on job function and role. We use two-factor authentication and strong password policies to prevent unauthorised access.

Encryption:

We use industry-standard encryption to protect all data in transit and at rest. All data is encrypted in transit using HTTPS/TLS, and all sensitive data at rest is encrypted using AES-256.

Firewalls:

We use firewalls to protect our systems and data from unauthorized access. Our firewalls are regularly updated to ensure that they are effective against the latest threats.

Monitoring:

We monitor our systems and networks 24/7 to detect and respond to security incidents. We use a combination of automated tools and manual monitoring to ensure that our systems are secure.

Vulnerability Management:

We have a formal vulnerability management process that includes regular vulnerability scanning and penetration testing. Any vulnerabilities identified are prioritized based on their severity and remediated as quickly as possible.

Disaster Recovery:

We have a comprehensive disaster recovery plan that includes regular backups and offsite storage of data. Our plan is regularly tested to ensure that it is effective and up-to-date.

Third-Party Vendors:

We only work with third-party vendors that meet our security standards. We perform due diligence on all vendors to ensure that they have appropriate security controls in place.

Employee Training:

All employees undergo regular security awareness training to ensure that they are aware of the latest security threats and how to prevent them. They are also required to sign and adhere to our security policies and procedures.

Compliance:

We comply with all relevant data protection laws, including POPIA, GDPR, and CCPA. We regularly review our security policies and procedures to ensure that they are up-to-date and compliant with all applicable laws and regulations.

We take our responsibility to protect our users’ data very seriously and are committed to providing a secure and reliable platform. We regularly review our security policies and procedures to ensure that they remain effective against the latest threats. If you have any questions or concerns about our security practices, please contact us.

Ready to take your business to the next level?

Start you free 7 day trial now. No credit card details required. Upgrade when you’re ready 🤩

LinkedIn          YouTube          Instagram          Facebook          Twitter          TikTok

Security          Terms & Conditions          Privacy Policy          PAIA & POPI

©  2024. Streamlime | A company by Journey AI Proprietary Limited | Reg: 2022/822311/07