Security is our prime concern, and we reflect it in all our processes. We follow a strict set of guidelines and practices to protect all private information entered by clients.
All user data will be encrypted at rest and on transit. A Proper Access Control is maintained on OS, Network, and Application layers to ensure confidentiality of client’s data.
Data is checksummed for integrity. All-access logs are recorded, immutable, and auditable such that we have a data lineage for every update. Cloud Snapshots are taken every day and retained for 90 days.
All our data is backed up in real-time and also at the end of the day. Having both hot as well as cold backup makes it reliable and easily accessible for the client. We hold data in the account as long as the client chooses to use Tigg Services. Upon request from the client to delete the data, we will either delete or de-identify their information. If neither is possible at the moment (for example, because the information has been stored in backup archives), then we will securely store the information and isolate it from any further use until deletion is possible.
Our servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. We have multiple geographically separated data replicas and hosting environments to minimize the risk of data loss or outages.
We have a robust logging and monitoring system for security of operation to ensure clean and secure traffic through our servers. Data retention and backup happen in a secure manner.
Tigg has been designed to grow with the client’s business. Our high-performance servers, networks, and infrastructure ensure we can deliver quality service to you and our thousands of other users.