Security

How we protect your data

Our Commitment to Security

At KwataDocs, we understand that your invoices contain sensitive business information. Protecting your data is fundamental to our service, and we implement multiple layers of security to safeguard your information.

Data Encryption

All data transmitted between your device and our servers is encrypted using industry-standard encryption protocols. Your data is also encrypted at rest, meaning your stored invoices and extracted information remain protected even in storage.

Authentication and Access Control

We use secure third-party authentication to verify user identities. This approach:

  • Eliminates the need to store passwords on our systems
  • Leverages established security infrastructure
  • Provides additional security features like two-factor authentication (when enabled by the user with their provider)

Access to your data is restricted to your authenticated account only. Our systems enforce strict access controls to ensure data isolation between users.

Infrastructure Security

Our infrastructure is hosted with reputable cloud service providers that maintain:

  • Physical security controls at data centers
  • Network security and monitoring
  • Regular security audits and certifications
  • Redundant systems for data availability

Secure Development Practices

Our development team follows security best practices including:

  • Regular code reviews with security focus
  • Dependency monitoring for known vulnerabilities
  • Input validation and sanitization
  • Protection against common web vulnerabilities

Data Backup and Recovery

We maintain regular backups of your data to protect against data loss. Our backup procedures include:

  • Regular automated backups
  • Encrypted backup storage
  • Tested recovery procedures
  • Geographic redundancy

Incident Response

In the unlikely event of a security incident, we have procedures in place to:

  • Quickly identify and contain the incident
  • Assess the impact and affected data
  • Notify affected users as required by law
  • Implement measures to prevent recurrence

Your Role in Security

Security is a shared responsibility. We recommend that you:

  • Use a strong, unique password with your authentication provider
  • Enable two-factor authentication where available
  • Keep your devices and browsers up to date
  • Log out of shared or public computers
  • Report any suspicious activity to us immediately

Data Retention and Deletion

You maintain control over your data. You can:

  • Export your data at any time
  • Delete individual invoices or your entire account
  • Request complete data removal by contacting us

When you delete data, it is removed from our active systems. Backup copies are removed according to our retention schedule.

Compliance

We are committed to complying with applicable data protection laws and regulations, including Canadian privacy legislation (PIPEDA). We continuously review and update our practices to maintain compliance as regulations evolve.

Limitations

While we implement strong security measures, no system can guarantee absolute security. We cannot be held liable for:

  • Security breaches caused by your own actions or negligence
  • Vulnerabilities in third-party services you use
  • Circumstances beyond our reasonable control

Please refer to our Terms of Service for complete liability information.

Security Updates

We continuously monitor and improve our security posture. This page will be updated as we implement new security measures. We may also communicate significant security updates through email.

Report a Security Issue

If you discover a security vulnerability or have concerns about the security of our service, please contact us immediately at:

Security Team
Email: security@kwatateam.com

We appreciate responsible disclosure and will work with you to address any legitimate security concerns.

Questions

For general security questions, please contact us at:

Kwata Team
Email: support@kwatateam.com
Website: kwatateam.com