Legal
Security Practices
At Toledah Technologies Ltd, the security of your business data is our top priority. Our products are designed to protect your data while using modern cloud infrastructure.
1. Data Storage & Database Security
Each customer has a dedicated database, isolated from others. Your data is never shared with other customers. Database security, updates, and patches are handled automatically by our infrastructure provider.
2. Encryption
All data in transit is encrypted with HTTPS/TLS. All data at rest is encrypted with AES-256. Backups are also encrypted.
3. Backups & Disaster Recovery
We maintain automated daily backups of your database. You can manually export or restore your database anytime from the dashboard. Your data can be recovered in case of unexpected events.
4. Authentication & Access Control
User accounts support secure login methods including passwords and OAuth. Passwords are stored securely with bcrypt hashing. Row-Level Security (RLS) controls exactly which users can access which data.
5. Monitoring & Logging
We track database activity, errors, and system metrics automatically. Performance and uptime are monitored to ensure reliable service. In Zaena, every transaction, edit, and deletion is recorded in a non-editable audit log.
6. Network & Infrastructure Security
Our services run on trusted cloud infrastructure. Servers are monitored, patched, and protected from network attacks. Physical security, firewalls, and DDoS mitigation are handled by the cloud provider.
7. What We Require From You
Use strong passwords and keep your login credentials private. Follow best practices for API keys and secrets. Implement proper access control rules in your account.
8. Responsible Disclosure
If you discover a security vulnerability, please contact us at support@toledah.com. We treat all reports with high priority and resolve issues responsibly.