Security & Data Protection
Your data security is our top priority
At PruShip, we understand that the security of your data is paramount. We employ industry-leading security practices and technologies to ensure your information is protected at all times. Our comprehensive security framework covers every aspect of data handling, from storage to transmission and access control.
Data Encryption
All data is encrypted both in transit and at rest using industry-standard AES-256 encryption. This ensures your sensitive information remains secure from unauthorized access.
Access Control
Role-based access control (RBAC) ensures that users only have access to the data and features they need. Multi-factor authentication (MFA) adds an extra layer of security to user accounts.
Regular Backups
Daily automated backups are performed and stored in geographically separate zones. This ensures data recovery capabilities in case of any unexpected incidents.
Continuous Monitoring
24/7 security monitoring and intrusion detection systems constantly watch for suspicious activities. Automated alerts ensure rapid response to potential security threats.
Secure Infrastructure
We leverage leading cloud service providers (Azure, AWS, Google Cloud) that maintain SOC 2, ISO 27001, and other security certifications for their infrastructure.
Compliance
We comply with GDPR, PDPA, and other relevant data protection regulations. Regular security audits and penetration testing ensure ongoing compliance and security.
Data Protection Measures
Network Security
Our network infrastructure is protected by multiple layers of firewalls and intrusion prevention systems. All connections are secured using SSL/TLS protocols, and we implement DDoS protection to ensure service availability.
Application Security
Our development team follows secure coding practices and conducts regular code reviews. We perform vulnerability assessments and penetration testing to identify and address potential security issues before they can be exploited.
Data Privacy
You retain full ownership of your data. We do not share, sell, or use your data for any purpose other than providing our services. Our NDA and PDPA agreements ensure your data privacy is protected at all times.
Private Hosting Options
For organizations with specific security requirements, we offer private cloud hosting options. You can choose to host your data in your own private cloud environment, with PruShip managing the setup and maintenance while you maintain full control over the infrastructure.
Incident Response
In the unlikely event of a security incident, we have a comprehensive incident response plan:
- Immediate incident detection and containment
- Rapid assessment of impact and affected systems
- Timely notification to affected customers
- Root cause analysis and remediation
- Post-incident review and security improvements
Employee Access
Access to customer data is strictly limited to authorized personnel who require it to perform their job functions. All employees undergo background checks and sign confidentiality agreements. We provide regular security awareness training to ensure our team follows best practices.
Third-Party Security
We carefully vet all third-party service providers and ensure they meet our security standards. All third-party integrations are reviewed for security vulnerabilities, and we maintain data processing agreements with all vendors who may have access to customer data.
Security Certifications
Our infrastructure partners maintain the following certifications:
- SOC 2 Type II
- ISO 27001
- PCI DSS (for payment processing)
- GDPR Compliance
- PDPA Compliance
Reporting Security Issues
If you discover a security vulnerability or have security concerns, please report them to us immediately:
Security Email: contact@pruship.com
Phone: +65 81684036
Address: 60 Paya Lebar Road, #06-28, Paya Lebar Square, Singapore 409051
We take all security reports seriously and will respond promptly to investigate and address any issues.
Continuous Improvement
Security is an ongoing process, not a one-time achievement. We continuously monitor the threat landscape, update our security measures, and adapt to new challenges. Regular security audits, penetration testing, and vulnerability assessments help us stay ahead of potential threats.