This document consolidates all the essential information regarding our privacy and security practices.
All required ISO 27001 and SOC 2 controls have been implemented. We are currently undergoing the official audit phase, expected to complete in Q3 2025.
This document addresses:
| Category | Description | Response Time | Resolution Time |
|---|---|---|---|
| Critical Errors | System downtime or blocking key functions. | < 2 hours | 8 hours |
| Security Issues | Issues that threaten user data or compromise security. | < 2 hours | 8 hours |
| Synchronization and API Errors | Proxuma addresses errors in system synchronization and API connectivity that are within our direct control and unrelated to external dependencies. | < 2 hours | 8 hours for errors and resolution within our direct control. |
| Outdated Environment Bugs | Errors on outdated browsers, operating systems, or non-standard devices. | 48 hours | Mutual agreement |
| Third-Party Caused Bugs | Bugs caused by third-party browser plugins or non-standard settings. | 48 hours | Mutual agreement |
| Performance Limit Exceeded | Issues arising under load conditions exceeding agreed thresholds. | 72 hours | Mutual agreement |
| Feature Requests | Additional features or improvements not included in the initial scope. | Scheduled | Mutual agreement |
Organizational Security
Our Commitment
Proxuma is committed to safeguarding your personal information. We adhere to the General Data Protection Regulation (GDPR), ensuring your data is:
Why We Collect Data
We collect personal information to:
Cookies and Website Data
Sensitive Information
Third-Party Data Sharing
We, in general, do not disclose Personal information, only:
Data Security
Legal Basis for Processing
We process personal data based on the following principles:
Your Rights
You have the right to:
Exercising Your Rights
To exercise your rights, contact us at help@proxuma.io Please note that identity verification may be required. If you are not satisfied with our response, you can escalate your concerns to the relevant Data Protection Authorities.
This policy is updated periodically and available on our website. For inquiries, contact help@proxuma.io
| Framework | Area | Measures and Technologies |
|---|---|---|
| ISO 27001 | Information Security Management System (ISMS) | Regular security audits, risk assessments, and a documented security policy. Internal audits, maintained security policies, and staff training. |
| ISO 27001 | Access Control | RBAC, MFA, and restricted access. Laravel RBAC, AWS IAM policies, MFA for admin access. |
| ISO 27001 | Data Encryption | Encryption at rest and in transit using SSL/TLS, AWS KMS, and PostgreSQL SSL connections. |
| ISO 27001 | Secure Development Practices | Secure coding guidelines, code reviews, and SDLC following OWASP practices. Static code analysis and CI/CD security checks. |
| ISO 27001 | Data Retention Policy | Daily Backup. Data retained for 30 days. Enforced with TTL and automated cleanup. |
| ISO 27001 | Employee Access to Customer Data | Restricted to authorized personnel using RBAC and least privilege principles. IAM roles, access logs. |
| ISO 27001 | Documentation Transparency | ISMS documentation and control mappings available upon request under NDA. Internal portal and audit packages. |
| HIPAA | Protected Health Information (PHI) Security | Encrypted PHI storage and transfer, access controls, regular audits, and monitoring. |
| HIPAA | Access Control | Strict PHI access controls with audit trails. Laravel Auth + AWS CloudTrail. |
| HIPAA | Data Integrity | Data integrity maintained with validation, constraints, logging, and backup checks. |
| HIPAA | Data Encryption | SSL/TLS for transit and encrypted AWS RDS databases at rest. |
| HIPAA | Regular Audits | Regular PHI access audits using AWS CloudWatch and CloudTrail. |
| GDPR | Data Protection and Privacy | Compliance with lawful, fair, transparent processing. Consent management, privacy policies, access rights. |
| GDPR | Right to Access and Erasure | Tools for user data access and deletion. Laravel user data management. |
| GDPR | Data Minimization | Minimal necessary data collected via validation, lifecycle management. |
| GDPR | Data Security | Encryption, access controls, secure APIs, and security assessments. |
| SOC 2 | Security, Availability, and Confidentiality | Access controls, monitoring, encryption, and incident response. |
| SOC 2 | Access Controls | Stringent access and logging. AWS IAM, CloudTrail, Laravel RBAC. |
| SOC 2 | Monitoring and Alerts | Real-time monitoring and alerts. AWS CloudWatch, CloudTrail. |
| SOC 2 | Incident Response | Incident response plans with training, drills, and escalation paths. |
| SOC 2 | Backup Scope & Storage | Daily encrypted backups of non-API data, stored securely and encrypted with 30 days retention. AWS Backup, PostgreSQL snapshots. |
| SOC 2 | Microsoft Integration Security | Graph API with scoped OAuth access. No impersonation. Verified Enterprise app, delegated access with MFA. |
| SOC 2 (CC3.2) | Protection Against Unauthorized Changes | Change approvals and configuration logging. Terraform, AWS Config, Git restrictions. |
| SOC 2 (CC5.1) | Access Management for Infrastructure | Least privilege, MFA, and logging. AWS IAM, MFA, CloudTrail. |
| SOC 2 (CC6.1) | Secure Configuration of Systems | Secure software environments. IAM policies, secure APIs, Git controls. |
| SOC 2 (CC6.2) | Protection Against Malware in Development | Isolated dev, anti-malware, restricted access. |
| SOC 2 (CC6.3) | Configuration Management of Infrastructure | Automated config management and monitoring. Terraform/Ansible, AWS Config. |
| SOC 2 (CC6.5) | Endpoint Security | Endpoint protection, restricted access, encryption. |
| SOC 2 (CC6.6) | Network Security | Firewalls, IDS/IPS, network segmentation, AWS VPC, Snort. |
| SOC 2 (CC6.7) | Encryption of Data in Transit | TLS, VPN, and encrypted DB connections. TLS 1.2/1.3, IPsec, RDS encryption. |
| SOC 2 (CC6.8) | Sensitive Data in the SDLC | Data masking in non-prod, encrypted storage. AES-256, masking tools. |
| SOC 2 (CC7.1) | Detection of Security Incidents | SIEM, alerting systems, log aggregation. CloudWatch, Splunk, Datadog, CloudTrail. |
| SOC 2 (CC7.2) | Evaluation and Remediation of Incidents | Incidents are reported in Jira. Includes classification and root cause analysis. |
| SOC 2 (CC7.3) | Incident Management | Documented response roles and testing. PagerDuty, tabletop exercises. |
| SOC 2 (CC7.4) | Software Release Management | CI/CD with approvals and logging. GitLab, Jenkins, signed artifacts. |
| SOC 2 (CC7.5) | Vulnerability Management | Vulnerability scanning, patching, reviews. Nessus, SonarQube, Qualys. |
| SOC 2 (CC8.1) | Communication of Security Incidents | Incident templates, notification processes. Internal communications and legal review. |
| SOC 2 (CC9.1) | Protection Against Data Loss | Secure, encrypted backups with retention testing. AWS Backup, encrypted S3, RDS. |
| SOC 2 (CC9.2) | Resilience and Redundancy | High availability architecture with DR testing. AWS ELB, Auto Scaling, DR playbooks. |