Our data security doesn't rest. So that you can

Security is our prime concern, and we reflect it in all our processes. We follow a strict set of guidelines and practices to protect all private information entered by clients.

Data Confidentiality

All user data will be encrypted at rest and on transit. A Proper Access Control is maintained on OS, Network, and Application layers to ensure confidentiality of client’s data.

Data Integrity

Data is checksummed for integrity. All-access logs are recorded, immutable, and auditable such that we have a data lineage for every update. Cloud Snapshots are taken every day and retained for 90 days.

Data Availability

All our data is backed up in real-time and also at the end of the day. Having both hot as well as cold backup makes it reliable and easily accessible for the client. We hold data in the account as long as the client chooses to use Tigg Services. Upon request from the client to delete the data, we will either delete or de-identify their information. If neither is possible at the moment (for example, because the information has been stored in backup archives), then we will securely store the information and isolate it from any further use until deletion is possible.

Secure Data Centers

Our servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. We have multiple geographically separated data replicas and hosting environments to minimize the risk of data loss or outages.

Data Transfer Traffic

We have a robust logging and monitoring system for security of operation to ensure clean and secure traffic through our servers. Data retention and backup happen in a secure manner.

Data Holding Capacity

Tigg has been designed to grow with the client’s business. Our high-performance servers, networks, and infrastructure ensure we can deliver quality service to you and our thousands of other users.