Security & Compliance

Your data security is our top priority. Learn about our enterprise-grade security measures and compliance certifications.

Last updated: December 15, 2024

Enterprise-Grade Security

We implement industry-leading security practices to protect your data and ensure your feedback management process is secure and compliant.

Data Encryption
End-to-end encryption for data in transit and at rest
  • AES-256 encryption
  • TLS 1.3 for data in transit
  • Encrypted database storage
Access Control
Multi-factor authentication and role-based access control
  • 2FA/MFA support
  • SSO integration
  • Granular permissions
Team Security
Secure collaboration with audit trails and session management
  • Session timeouts
  • IP restrictions
  • Activity logging
Data Protection
Comprehensive data backup, retention, and recovery
  • Automated backups
  • Point-in-time recovery
  • Data retention policies

Compliance & Certifications

We maintain rigorous compliance standards to ensure your data is protected according to industry best practices and regulatory requirements.

SOC 2 Type II
Certified

Service Organization Control 2 compliance for security, availability, and confidentiality

GDPR
Compliant

General Data Protection Regulation compliance for EU data protection

CCPA
Compliant

California Consumer Privacy Act compliance for California residents

ISO 27001
In Progress

Information Security Management System certification

Security Practices

Our comprehensive security approach covers infrastructure, application, and data security to provide multiple layers of protection.

1
Infrastructure Security
  • Multi-zone cloud architecture with private networks
  • DDoS protection and rate limiting
  • Regular security audits and penetration testing
  • 24/7 security monitoring and incident response
2
Application Security
  • Secure software development lifecycle (SDLC)
  • Regular security code reviews and static analysis
  • Vulnerability scanning and dependency management
  • Security testing in CI/CD pipelines
3
Data Security
  • Data classification and handling procedures
  • Encryption key management and rotation
  • Data loss prevention (DLP) measures
  • Secure data disposal and retention policies

Additional Security Measures

Infrastructure
  • • Multi-region redundancy
  • • Automated failover
  • • 99.9% uptime SLA
  • • Real-time monitoring
Authentication
  • • Multi-factor authentication
  • • SSO integration
  • • Role-based access
  • • Session management
Privacy
  • • Data anonymization
  • • Privacy by design
  • • User consent management
  • • Data portability

Security Incident Response

We have a comprehensive incident response plan to quickly address and resolve any security concerns.

Our Response Process

1

Detection & Analysis

24/7 monitoring and automated threat detection

2

Containment & Eradication

Immediate response to isolate and resolve threats

3

Recovery & Lessons

Restore services and improve security measures

Reporting Security Issues

If you discover a security vulnerability or have security concerns, please report them immediately.

thinctech.org@gmail.com
(+81) 964 595 374 (Security Hotline)

Security Team Contact

Our dedicated security team is available to address your security questions and concerns.

Security Email

thinctech.org@gmail.com

Security Hotline

(+81) 964 595 374

Address

ThincTech
21 Khu nhà ở Nam Hòa, Đường 270 Đỗ Xuân Hợp
P. Phước Long A, Quận 9, TPHCM, Vietnam

81-83 Đường Campbell, Surry Hills
NSW 2010, Australia

Questions About Our Security?

We're committed to transparency and protecting your data. Contact our security team for more information.