Built for Enterprise Security
Certifications & Standards
Our compliance posture across key international frameworks.
Controls implemented. Formal audit targeted Q4 2026.
DPA, SCCs (Module 2), sub-processor list, right-to-erasure workflows.
India Digital Personal Data Protection Act. Full consent framework implemented.
Privacy Act 1988 (Cth) Australian Privacy Principles compliance.
California Consumer Privacy Act. Data rights request portal available.
Payment processing handled by PCI-DSS Level 1 certified partners (Windcave / Qvalent). Propeter never stores raw card data.
Security, Availability, and Confidentiality trust service criteria. Audit scoped for 2027.
AES-256 at rest, TLS 1.3 in transit. Guest PII field-level encrypted.
Compliance Matrix
| Requirement | India | EU / UK | Australia | USA (California) |
|---|---|---|---|---|
| Data Processing Agreement | Available | Available | Available | Available |
| Standard Contractual Clauses | N/A | Module 2 signed | Available | Available |
| Right to Erasure / Deletion | Supported | Supported | Supported | Supported |
| Data Portability | JSON/CSV export | JSON/CSV export | JSON/CSV export | JSON/CSV export |
| Sub-processor Disclosure | List published | List published | List published | List published |
| Breach Notification | 72h (DPDP) | 72h (GDPR) | NDB Scheme | 72h CCPA |
| Data Residency Option | India (Mumbai) | EU region roadmap | AU region roadmap | AWS US East (shared) |
| Penetration Testing | Annual third-party pentest. Results available under NDA. | |||
Security Documentation
Security Overview
Executive summary of Propeter’s security program, controls, and risk management approach.
Security Architecture
7-layer infrastructure security diagram. Network segmentation, WAF, IDS/IPS, and zero-trust principles.
Encryption Standards
AES-256 at rest, TLS 1.3 in transit, field-level PII encryption, HSM key management.
Backup & Recovery Policy
RPO 4h / RTO 8h targets, daily automated backups, geo-redundant replication, retention schedules.
Disaster Recovery Plan
Full DR runbook — failover procedures, escalation matrix, test schedule, and RTO commitments.
Uptime SLA
99.9% uptime commitment, measurement methodology, credit schedule, maintenance windows.
Privacy Policy
Full data collection, usage, retention, and sharing disclosure for all jurisdictions.
Data Processing Agreement
GDPR-compliant DPA covering controller/processor obligations, SCCs, and sub-processors.
Security Contacts
Security Team
Vulnerability disclosure, security assessments, NDA requests for pentest reports.
Data Privacy (DPO)
Data subject requests, DPA queries, sub-processor list, GDPR / DPDP compliance queries.
We follow responsible disclosure. Please allow 5 business days for triage on reported vulnerabilities. Critical issues are acknowledged within 24 hours.
Enhance customer engagement with our intelligent chatbot solutions. Seamlessly automate conversations and elevate user experiences with cutting-edge AI technology.
Products
Copyright © 2026 propeter | Powered by Propeter