AsiliGuide

Security Policy

Last updated: October 2025

1. Overview

AsiliGuide takes the security and confidentiality of your data seriously. This Security Policy outlines the administrative, technical, and physical safeguards we employ to protect all information entrusted to our platform.

2. Data Protection

  • All sensitive data is encrypted in transit (TLS 1.3) and at rest (AES-256).
  • Backups are encrypted and securely stored with redundant cloud providers.
  • We employ continuous monitoring for unauthorized access and data anomalies.
  • Customer data is logically separated to ensure isolation between organizations.

3. Infrastructure Security

  • Hosted on secure, SOC 2-compliant infrastructure with 24/7 monitoring.
  • Regular patching and vulnerability scans are performed on all systems.
  • Firewalls and intrusion detection systems protect production environments.
  • Separate staging and production environments reduce operational risk.

4. Access Control

  • Access to systems and data is restricted based on job role and necessity.
  • Multi-factor authentication (MFA) is enforced for all administrative accounts.
  • All access events are logged and reviewed for unusual activity.
  • Automatic session timeouts minimize exposure from unattended devices.

5. Compliance Standards

AsiliGuide aligns with industry-recognized frameworks to ensure regulatory compliance and data governance:

  • HIPAA (H ealth I nsurance P ortability and A ccountability A ct)
  • GDPR (EU General Data Protection Regulation)
  • SOC 2 Type II security controls
  • Periodic third-party security assessments and audits

6. Incident Response

In the unlikely event of a security incident, AsiliGuide follows a formal response process designed to contain, investigate, and remediate the issue quickly.

  • 24/7 incident escalation procedures are in place.
  • Customers are notified promptly of any breach involving their data.
  • Root-cause analysis and mitigation plans are completed for every event.

7. Contact Us

For questions regarding our security practices or to report a potential vulnerability, please contact our security team: