| S.No | Type of control | Compliance |
| 1 | Office Access | Access inside office is through facial recognition at every gate entrance |
| 2 | Visitor entering restricted development area | Visitor meeting rooms are outside the restricted access area. By policy no visitor is allowed inside the restricted access area, unless permitted and accompanied by a senior grade employee |
| 3 | Employee log-in | Every employee has unique log-in and password and logs into system with that. If an employee biometric is not recorded, log-in at office is denied. Physical presence is must for employee to log-in at office premises |
| 4 | Product Update | Quality Assurance clears for product update at production |
| 5 | Product update control | Build numbers form the basis towards control for production updates and are documented explicitly through our internal control systems |
| 6 | Production database access | Only authorised personnel are allowed access to production database |
7
| Production database password length | Production database password are minimum length of 25 characters long |
| 8 | Production users log | All production user actions are logged for security monitoring |
| 9 | Network Security For production access | NetworkSecurity Group is implemented to block access from other than our domain network. Further only required ports are enabled for access. |
| 10 | Production data at rest | All documents at rest are encrypted |
| 11 | Data transmission | All data transmission are encrypted with Aes Encryption and hashed with industry standard hashing algorithm. |
| 12 | User Access | All user access through secured socket layer and with their unique login id and password |
| 13 | Audit | Every transaction and access is captured & recorded into the system. The Audit Trial feature of the system provides history of events such as created, modified, viewed and actioned along with date, time & IP stamp |
| 14 | Backups | Backups are taken at regular intervals and minimum of three times a day by authorised personnel and stored in secured location |
| 15 | Software support system | A ticketing system exists for users to log support requests with SLA indicators. Support tickets are closed by users or elapse of time |
| 16 | Data deletion | All customers data are deleted after 30 days from the date they cease to subscribe |
| 17 | User passwords | User passwords are hashed and stored in the database and no password is stored in its native form |
| 18 | User last log-in | Every user can see their last log-in at the top right corner of the screen when they log-in for self-audit |
| 19 | Penetration Testing | Internal penetration testing is done every quarter and remediation are closed with proper followup. |