Back to Home
Privacy Policy Terms of Service Cookie Policy Security

Security Policy

Our commitment to protecting your data and ensuring service security

Last Updated: January 01, 2026

Contents

  • Security Commitment
  • Data Protection
  • Technical Security
  • Network Security
  • Application Security
  • Incident Response
  • Compliance & Auditing
  • User Responsibility
  • Vulnerability Disclosure
  • Contact Security Team

1. Our Security Commitment

At AshParX, security is at the core of everything we do. We are committed to protecting the confidentiality, integrity, and availability of your data and our services.

Security First Approach

Security by Design: We integrate security measures at every stage of our development process, from initial design to deployment and maintenance.

1.1 Security Principles

Our security practices are built on these core principles:

  • Confidentiality: Protecting data from unauthorized access
  • Integrity: Ensuring data accuracy and consistency
  • Availability: Ensuring systems are accessible when needed
  • Accountability: Tracking access and changes to data
  • Transparency: Being open about our security practices

1.2 Continuous Improvement

We continuously monitor, assess, and improve our security measures to address evolving threats and maintain the highest standards of data protection.

2. Data Protection Measures

We implement multiple layers of protection for your data:

2.1 Data Encryption

  • In Transit: All data transmitted between your device and our servers uses TLS 1.2+ encryption
  • At Rest: Sensitive data stored in our databases is encrypted using AES-256 encryption
  • Backup Encryption: All backups are encrypted before storage

2.2 Data Minimization

We follow the principle of data minimization by:

  • Collecting only necessary data for service provision
  • Regularly reviewing and purging unnecessary data
  • Implementing data retention policies
  • Anonymizing data where possible for analytics

2.3 Data Access Controls

  • Role-Based Access: Employees access only data necessary for their role
  • Multi-Factor Authentication: Required for all administrative access
  • Access Logging: All data access is logged and monitored
  • Regular Reviews: Access permissions reviewed quarterly
Encryption Standards

Industry Best Practices: We use industry-standard encryption algorithms and protocols to ensure maximum protection for your data.

3. Technical Security Controls

Our technical infrastructure is designed with security as a priority:

3.1 Infrastructure Security

  • Secure Hosting: Services hosted on secure, ISO 27001 certified data centers
  • Firewalls: Multi-layer firewall protection
  • DDoS Protection: Advanced DDoS mitigation services
  • Intrusion Detection: Real-time intrusion detection systems

3.2 Server Security

  • Hardened Systems: Servers hardened according to security benchmarks
  • Regular Patching: Security patches applied within 72 hours of release
  • Malware Protection: Endpoint protection on all servers
  • Vulnerability Scanning: Regular vulnerability assessments

3.3 Monitoring & Logging

  • 24/7 Monitoring: Continuous monitoring of systems and networks
  • Security Logs: Comprehensive logging of security events
  • Alert System: Automated alerts for suspicious activities
  • SIEM System: Security Information and Event Management

4. Network Security

We protect our network infrastructure through multiple security layers:

4.1 Network Architecture

  • Segmentation: Network segmentation to isolate sensitive data
  • VPN Access: Secure VPN for remote administrative access
  • Load Balancers: Secure load balancing with SSL termination
  • WAF: Web Application Firewall protection

4.2 Network Monitoring

  • Traffic Analysis: Continuous analysis of network traffic
  • Anomaly Detection: Detection of unusual network patterns
  • Bandwidth Monitoring: Monitoring for DDoS and abuse
  • Real-time Alerts: Immediate notification of security events

4.3 Mobile Network Security

For our mobile applications (NetX, FoxBattle):

  • Secure APIs: All API communications encrypted
  • Certificate Pinning: Protection against MITM attacks
  • Network Validation: Validation of network connections
  • Secure Storage: Encrypted local storage on devices

5. Application Security

We follow secure development practices for all our applications:

5.1 Secure Development Lifecycle

  • Security Requirements: Security requirements defined at project start
  • Threat Modeling: Regular threat modeling sessions
  • Code Reviews: Security-focused code reviews
  • Security Testing: Automated and manual security testing

5.2 Common Security Practices

  • Input Validation: Validation of all user inputs
  • Output Encoding: Protection against XSS attacks
  • SQL Injection Prevention: Parameterized queries and ORM
  • CSRF Protection: Protection against cross-site request forgery

5.3 Third-Party Dependencies

  • Dependency Scanning: Regular scanning for vulnerabilities
  • Version Management: Keeping dependencies up-to-date
  • License Compliance: Monitoring open-source licenses
  • Code Analysis: Static and dynamic code analysis
Secure Coding Standards

OWASP Guidelines: Our development team follows OWASP secure coding practices and regularly trains on the latest security threats and mitigation techniques.

6. Incident Response

We have established procedures for responding to security incidents:

6.1 Incident Response Plan

  • Identification: Rapid detection of security incidents
  • Containment: Immediate containment of threats
  • Investigation: Thorough investigation of incidents
  • Remediation: Complete remediation of issues
  • Recovery: Restoration of normal operations
  • Lessons Learned: Documentation and improvement

6.2 Communication Protocol

In case of a security incident affecting user data:

  • Timely Notification: Notification within 72 hours of discovery
  • Transparent Communication: Clear explanation of the incident
  • Remediation Steps: Information about steps taken
  • Preventive Measures: Measures to prevent recurrence
  • Support: Dedicated support for affected users

6.3 Regular Testing

  • Tabletop Exercises: Regular incident response exercises
  • Penetration Testing: Annual penetration tests
  • Red Team Exercises: Simulated attack scenarios
  • DR Drills: Disaster recovery drills

7. Compliance & Auditing

We maintain compliance with relevant regulations and standards:

7.1 Legal Compliance

  • Data Protection Laws: Compliance with applicable data protection regulations
  • Industry Standards: Following industry best practices
  • Regular Assessments: Regular compliance assessments
  • Legal Updates: Monitoring changes in laws and regulations

7.2 Security Audits

  • Internal Audits: Quarterly internal security audits
  • External Audits: Annual external security assessments
  • Penetration Tests: Regular penetration testing
  • Vulnerability Assessments: Monthly vulnerability scans

7.3 Certifications & Standards

While we work toward formal certifications, we currently implement controls aligned with:

  • ISO 27001 Information Security Management
  • OWASP Application Security Standards
  • NIST Cybersecurity Framework
  • CIS Critical Security Controls

8. User Security Responsibilities

Security is a shared responsibility. Users should also take steps to protect their accounts and data:

8.1 Account Security

  • Strong Passwords: Use unique, complex passwords
  • Password Manager: Consider using a password manager
  • Regular Updates: Change passwords periodically
  • Multi-Factor Authentication: Enable MFA where available

8.2 Device Security

  • Device Updates: Keep devices and apps updated
  • Antivirus Software: Use reputable security software
  • Secure Networks: Avoid public Wi-Fi for sensitive activities
  • App Permissions: Review app permissions regularly

8.3 Phishing Awareness

  • Verify Sources: Verify emails and messages
  • Suspicious Links: Avoid clicking suspicious links
  • Personal Information: Never share passwords or OTPs
  • Report Suspicious Activity: Report suspicious emails to us
Shared Responsibility

Your Role: While we implement strong security measures, users must also take precautions to protect their accounts and devices. Security is most effective when we work together.

9. Vulnerability Disclosure Program

We encourage responsible disclosure of security vulnerabilities:

9.1 Reporting Vulnerabilities

If you discover a security vulnerability, please:

  • Email details to: contact@ashparx.com
  • Include detailed steps to reproduce the issue
  • Provide your contact information
  • Allow reasonable time for investigation
  • Do not publicly disclose until we've addressed it

9.2 Our Commitment

  • Timely Response: We will acknowledge receipt within 48 hours
  • Investigation: Thorough investigation of reported issues
  • Transparent Updates: Regular updates on investigation progress
  • Fix Timeline: Priority-based fixing of vulnerabilities
  • Credit: Option to credit researchers (if desired)

9.3 Safe Harbor

We will not take legal action against security researchers who:

  • Make a good faith effort to avoid privacy violations
  • Do not access or modify other users' data
  • Give us reasonable time to address issues
  • Do not use the vulnerability for personal gain

10. Contact Our Security Team

For security-related inquiries, please contact our security team:

Security Contact Information

Security Team Email: contact@ashparx.com
PGP Key: Available upon request for secure communication
Address: 147/2 Khairwani Multai, Betul, Madhya Pradesh, India 460663

10.1 Response Times

  • General Inquiries: 2-3 business days
  • Security Questions: 1-2 business days
  • Vulnerability Reports: 48 hours acknowledgment
  • Security Incidents: Immediate response

10.2 Security Updates

We regularly publish security updates and advisories. Subscribe to our security mailing list for updates by emailing contact@ashparx.com with "SUBSCRIBE" in the subject line.

Note: This Security Policy is part of our commitment to transparency and trust. We regularly review and update our security practices to ensure the highest level of protection for our users and their data.

AshParX Logo AshParX

Empowering Everyone with Free & Open Technology!

Privacy Policy Terms of Service Cookie Policy Security

© AshParX. All rights reserved. | Free Software for Everyone