Skip to main content

Data Security

How Yayati secures your data

V
Written by Vivek Pai
Updated over 9 months ago

Data is the lifeblood of Yayati. As such, data security is paramount to our business. We follow industry best practices in security and protecting data:

  • SOC II Compliance – Rigorous, independent audits of our security controls. We also require our data sub-processors to meet or exceed our privacy and security standards.

  • Zero-Trust Security – Yayati operates on the principle of “never trust, always verify” where no user, device, or application is inherently trusted, requiring continuous verification of identity and security posture before granting access to any system or data. Once access is granted, only the minimum level of access needed to perform a task is granted.

  • Continuous Security Monitoring – Our systems are monitored 24/7 for security and software updates.

  • Secure Cloud Infrastructure – All data is stored and processed in enterprise-grade cloud environments.

  • Data Collection – We only collect data that is necessary for our operations and servicing clients, while eliminating unnecessary data that we receive

  • Data Storage and Retrival – We encrypt all data in transit and at rest.

  • Data Processing – All data we process must have a legitimate legal basis.

  • CCPA and GDRP – Upon request, we can facilitate deletion of customer specific data in compliance with CCPA and GDPR laws.

Did this answer your question?