1. Commitment
Veritas Index maintains strict data protection and cybersecurity controls.
2. Encryption
We use:
AES-256 for data at rest
TLS 1.3 for data in transit
Encrypted backups
3. Access Controls
Role-based access (RBAC)
Least privilege principle
MFA for institutions
4. TDM Security Model
Full-text files are:
Stored encrypted
Not accessible to users
Processed only by automated systems
5. Infrastructure Security
Includes:
Firewalls
Intrusion detection
Continuous monitoring
Vulnerability scanning
6. Data Minimization
We collect only essential data and delete full text when appropriate.
7. Third-Party Processors
Any third parties follow strict data protection agreements.
8. Incident Response
In case of breach:
Containment
Assessment
Notification within 72 hours
Contact: support@veritasindex.com
