SECURITY POLICY

Effective Date: February 26, 2026

Last Updated: February 26, 2026

Security Policy

This Security Policy outlines the security measures implemented by Design Pixel Ltd ("Company," "we," "our," "us") to protect your data and ensure the security of our services. We are committed to safeguarding your information and preventing unauthorized access, disclosure, alteration, and destruction of data.

1. Data Protection and Security Measures

We are committed to ensuring the protection of your data and have put in place various security protocols to maintain its integrity and confidentiality. These measures include, but are not limited to:

  • Encryption: All sensitive data is encrypted using industry-standard encryption methods (such as SSL/TLS) during transmission and at rest.
  • Access Control: Access to personal data and critical systems is restricted to authorized personnel only. Employees and contractors must adhere to strict confidentiality agreements.
  • Multi-factor Authentication (MFA): We require MFA for accessing sensitive systems and data.
  • Data Minimization: We collect only the minimum amount of personal data necessary to provide our services, in accordance with GDPR guidelines.

2. Infrastructure Security

We maintain secure, reliable, and robust infrastructure to ensure the stability and security of our services:

  • Firewall Protection: We use firewalls and intrusion detection systems to protect our network from unauthorized access and potential threats.
  • Secure Hosting: Our platform is hosted in a secure, monitored data center following best practices for physical and network security.
  • Regular Security Audits: We conduct regular security audits and vulnerability assessments to identify and address potential weaknesses.

3. Application Security

We adhere to best practices for developing and maintaining secure applications:

  • Secure Software Development Lifecycle (SDLC): Our development process includes secure coding practices to minimize security risks during software development.
  • Patch Management: We maintain an active patch management process to ensure that all systems and applications are up to date with the latest security patches.
  • Code Reviews and Testing: All code is reviewed for security vulnerabilities before deployment. We also perform regular security testing, including penetration testing.

4. Data Privacy Compliance

We are dedicated to adhering to data privacy laws and regulations, including the General Data Protection Regulation (GDPR), to ensure your personal data is handled in a lawful, fair, and transparent way.

  • Data Access and Control: You have the right to access, update, or delete your personal data as outlined in our Privacy Policy.
  • Data Retention: We will keep your personal data only for as long as necessary to fulfill the purposes for which it was collected and in compliance with legal obligations.
  • Data Breach Response: If a data breach occurs, we will inform the affected individuals within 72 hours of becoming aware of the breach, in line with GDPR requirements.

5. Employee Training and Awareness

We offer continuous security training to our employees to ensure they are well-informed and follow best practices for data security and privacy.

  • Training Programs:Employees participate in ongoing training on security best practices, including data protection and the secure use of company systems.
  • Incident Response: We have a clear and structured incident response plan to detect, manage, and address security incidents effectively.

6. Third-Party Service Providers

We may engage third-party service providers to help deliver our services, including hosting, payment processing, and analytics. We ensure that all third-party providers comply with our security and privacy standards:

  • Due Diligence: We conduct regular assessments of third-party providers to verify their adherence to applicable security and privacy standards.
  • Contracts and Agreements: Our contracts include security provisions to ensure third-party providers are held accountable for their data protection practices.

7. Incident Response and Reporting

In the event of a security incident, we have procedures in place to detect, contain, and resolve the issue:

  • Detection and Identification: We monitor our systems for unusual activities that may indicate a breach.
  • Containment: If a breach occurs, we work swiftly to contain and minimize its impact.
  • Resolution and Recovery: Corrective actions are implemented to resolve the issue and restore normal operations as quickly as possible.
  • Notification: We notify affected parties, including clients and regulators, in compliance with applicable laws.

8. User Responsibilities

While we take extensive measures to protect your data, you also have a role in ensuring security:

  • Access Control: Do not share your login credentials with others, and immediately notify us if you suspect unauthorized access to your account.
  • System Updates: Ensure that any software used to access our services is regularly updated to protect against security vulnerabilities.
  • Password Management: You are responsible for creating strong, unique passwords and securing your account credentials.

9. Security Updates

We are committed to continuously improving our security measures. As new threats and vulnerabilities emerge, we will update our security protocols accordingly. Any significant changes will be communicated to you.

10. Changes to This Security Policy

We may update this Security Policy from time to time to reflect changes in practices or legal requirements. Updates will be posted with the updated "Effective Date." We encourage you to review this policy periodically.

11. Contact Information

If you have any questions or concerns about this Security Policy, please contact us at:

Design Pixel Ltd
Registered Address: 27 Old Gloucester Street, London, United Kingdom, WC1N 3AX
Email: royalpixelltd@gmail.com