Security & Data Protection

Your data security is our top priority

At PruShip, we understand that the security of your data is paramount. We employ industry-leading security practices and technologies to ensure your information is protected at all times. Our comprehensive security framework covers every aspect of data handling, from storage to transmission and access control.

Data Encryption

All data is encrypted both in transit and at rest using industry-standard AES-256 encryption. This ensures your sensitive information remains secure from unauthorized access.

Access Control

Role-based access control (RBAC) ensures that users only have access to the data and features they need. Multi-factor authentication (MFA) adds an extra layer of security to user accounts.

Regular Backups

Daily automated backups are performed and stored in geographically separate zones. This ensures data recovery capabilities in case of any unexpected incidents.

Continuous Monitoring

24/7 security monitoring and intrusion detection systems constantly watch for suspicious activities. Automated alerts ensure rapid response to potential security threats.

Secure Infrastructure

We leverage leading cloud service providers (Azure, AWS, Google Cloud) that maintain SOC 2, ISO 27001, and other security certifications for their infrastructure.

Compliance

We comply with GDPR, PDPA, and other relevant data protection regulations. Regular security audits and penetration testing ensure ongoing compliance and security.

Data Protection Measures

Network Security

Our network infrastructure is protected by multiple layers of firewalls and intrusion prevention systems. All connections are secured using SSL/TLS protocols, and we implement DDoS protection to ensure service availability.

Application Security

Our development team follows secure coding practices and conducts regular code reviews. We perform vulnerability assessments and penetration testing to identify and address potential security issues before they can be exploited.

Data Privacy

You retain full ownership of your data. We do not share, sell, or use your data for any purpose other than providing our services. Our NDA and PDPA agreements ensure your data privacy is protected at all times.

Private Hosting Options

For organizations with specific security requirements, we offer private cloud hosting options. You can choose to host your data in your own private cloud environment, with PruShip managing the setup and maintenance while you maintain full control over the infrastructure.

Incident Response

In the unlikely event of a security incident, we have a comprehensive incident response plan:

  • Immediate incident detection and containment
  • Rapid assessment of impact and affected systems
  • Timely notification to affected customers
  • Root cause analysis and remediation
  • Post-incident review and security improvements

Employee Access

Access to customer data is strictly limited to authorized personnel who require it to perform their job functions. All employees undergo background checks and sign confidentiality agreements. We provide regular security awareness training to ensure our team follows best practices.

Third-Party Security

We carefully vet all third-party service providers and ensure they meet our security standards. All third-party integrations are reviewed for security vulnerabilities, and we maintain data processing agreements with all vendors who may have access to customer data.

Security Certifications

Our infrastructure partners maintain the following certifications:

  • SOC 2 Type II
  • ISO 27001
  • PCI DSS (for payment processing)
  • GDPR Compliance
  • PDPA Compliance

Reporting Security Issues

If you discover a security vulnerability or have security concerns, please report them to us immediately:

Security Email: contact@pruship.com

Phone: +65 81684036

Address: 60 Paya Lebar Road, #06-28, Paya Lebar Square, Singapore 409051

We take all security reports seriously and will respond promptly to investigate and address any issues.

Continuous Improvement

Security is an ongoing process, not a one-time achievement. We continuously monitor the threat landscape, update our security measures, and adapt to new challenges. Regular security audits, penetration testing, and vulnerability assessments help us stay ahead of potential threats.