Security & Compliance

Encryption

Protection

Compliance

Cloud Hosting

Last Updated: 17-August-2025

At Brijik CRM, safeguarding customer data is our highest priority. We combine strong technical controls, operational best practices, and compliance with leading regulations to ensure your data remains secure, private, and available.

1. Infrastructure & Hosting

Our Platform is hosted on secure cloud infrastructure (AWS/Azure/GCP) with redundancy, automated backups, and disaster recovery. Data centers are ISO 27001 and Tier-III+ certified, with strong physical security controls.

2. Data Encryption

3. Access Control

4. Application Security

5. Compliance & Legal

6. Privacy & Confidentiality

We never sell customer data. Processing is done strictly per our Privacy Policy. Customers always retain ownership of their CRM data.

7. Incident Response

We maintain a Security Incident Response Policy. In the event of a breach, affected Customers will be notified promptly with details and remediation steps.

8. Audit & Monitoring

Real-time monitoring, intrusion detection systems, and log retention policies are in place. Regular third-party audits validate our controls.

9. Employee Security

Employees undergo background verification and continuous security training. Access to sensitive systems is strictly controlled and logged.

10. API & Integration Security

APIs use OAuth2 / API keys with rate limiting. All responses are encrypted, and abuse is prevented through throttling and monitoring.

11. Availability & SLA

We target 99.9% uptime with proactive monitoring and redundancy. A public status page will be made available for transparency.

12. Customer Responsibilities

13. Certifications & Roadmap

We are actively pursuing:

14. Contact Security Team

To report vulnerabilities or security concerns:
📧 security@brijik.com
📞 9987565669
🏢 Mumbai, India