Security
Last updated: 7 December 2025
1. Our Security Commitment
At Equily HRMS, we understand that your HR data is among your most sensitive business information. We are committed to implementing the highest standards of security to protect your data and ensure the confidentiality, integrity, and availability of your information.
Our security measures comply with Indian data protection laws, international security standards, and industry best practices to safeguard your organization's sensitive information.
2. Data Encryption
2.1 Encryption in Transit
All data transmitted between your devices and our servers is encrypted using industry-standard TLS 1.3 encryption protocols. This ensures that your data cannot be intercepted or read by unauthorized parties during transmission.
2.2 Encryption at Rest
All data stored in our databases and file systems is encrypted using AES-256 encryption. This means that even if someone gains unauthorized access to our storage systems, your data remains protected and unreadable.
2.3 Key Management
Encryption keys are managed using secure key management systems with automatic key rotation and secure key storage to prevent unauthorized access.
3. Access Control and Authentication
3.1 Multi-Factor Authentication (MFA)
We enforce multi-factor authentication for all user accounts to prevent unauthorized access. This includes SMS, email, and authenticator app-based verification methods.
3.2 Role-Based Access Control (RBAC)
Our system implements granular role-based access controls that ensure users can only access the data and features they need for their job functions.
3.3 Single Sign-On (SSO)
We support enterprise SSO solutions including SAML, OAuth, and LDAP integration to provide secure, centralized authentication for your organization.
4. Infrastructure Security
4.1 Secure Data Centers
Our data is hosted in ISO 27001 certified data centers with:
- 24/7 physical security monitoring
- Biometric access controls
- Redundant power and cooling systems
- Fire suppression and environmental controls
- Regular security audits and assessments
4.2 Network Security
Our network infrastructure is protected by:
- Advanced firewalls and intrusion detection systems
- DDoS protection and mitigation
- Network segmentation and micro-segmentation
- Regular vulnerability assessments
- 24/7 network monitoring and threat detection
5. Application Security
5.1 Secure Development Lifecycle
Our development process follows secure coding practices:
- Regular security code reviews
- Automated security testing in CI/CD pipeline
- OWASP Top 10 compliance
- Third-party security assessments
- Regular penetration testing
5.2 API Security
Our APIs are secured with:
- OAuth 2.0 and JWT token authentication
- Rate limiting and throttling
- Input validation and sanitization
- API versioning and deprecation policies
- Comprehensive API documentation
6. Data Backup and Recovery
6.1 Automated Backups
We maintain multiple layers of data backup:
- Real-time database replication
- Daily encrypted backups to multiple locations
- Point-in-time recovery capabilities
- Regular backup integrity testing
- Geographic distribution of backup data
6.2 Disaster Recovery
Our disaster recovery plan includes:
- Recovery Time Objective (RTO) of less than 4 hours
- Recovery Point Objective (RPO) of less than 1 hour
- Regular disaster recovery testing
- Business continuity planning
- Cross-region failover capabilities
7. Compliance and Certifications
We maintain compliance with various security standards and regulations:
- ISO 27001: Information Security Management System
- ISO 27018: Cloud Privacy Protection
- SOC 2 Type II: Security, Availability, and Confidentiality
- GDPR: General Data Protection Regulation compliance
- Indian Data Protection Laws: IT Act 2000 and related rules
- PCI DSS: Payment Card Industry Data Security Standard
8. Incident Response
We have a comprehensive incident response plan that includes:
- 24/7 security monitoring and alerting
- Dedicated incident response team
- Automated threat detection and response
- Regular incident response drills
- Customer notification procedures
- Post-incident analysis and improvement
9. Employee Security Training
All our employees undergo comprehensive security training including:
- Data protection and privacy training
- Secure coding practices
- Phishing and social engineering awareness
- Regular security updates and training
- Incident reporting procedures
- Background checks and security clearances
10. Third-Party Security
We carefully vet all third-party vendors and service providers:
- Security assessment of all vendors
- Data processing agreements with security requirements
- Regular vendor security audits
- Incident notification requirements
- Data residency and sovereignty compliance
11. Security Monitoring and Auditing
We continuously monitor our systems for security threats:
- Real-time security event monitoring
- Automated threat detection and response
- Regular security audits and assessments
- Penetration testing by third-party experts
- Vulnerability scanning and management
- Security metrics and reporting
12. Contact Our Security Team
If you have security concerns or need to report a security issue, please contact us:
Security Team
Email: hello@equily.in
Phone: +91 7011733681
Address: Gurgaon, Haryana, India
For urgent security matters, please mark your email as "URGENT - Security Issue"