SOC 2 Compliance

01.Introduction
At MAWALOG, we prioritize the security, availability, and confidentiality of our users’ data. As part of our commitment to industry-leading security standards, we comply with SOC 2 (System and Organization Controls 2) requirements, ensuring that our systems and processes meet the highest levels of data protection, privacy, and risk management.
02.Scope of SOC 2 Compliance
SOC 2 compliance is applicable to all MAWALOG infrastructure, services, and products, including:
- Personal information gathered from clients, partners, staff, and website users.
- Information handled via our cloud-based solutions, apps, and platforms.
- Service providers from outside the company that communicate with MAWALOG’s systems.
- This ensures that MAWALOG’s security measures align with industry best practices for data protection, monitoring, and risk mitigation.
03.Trust Services Criteria & Security Controls
Trust Services Criteria & Security Controls MAWALOG implements robust safeguards to safeguard sensitive data in accordance with SOC 2’s five trust service principles:
Security
We guard our systems against attacks, breaches, and illegal access by:-
End-to-End Encryption:Encrypt data securely while it’s being transmitted and stored.
-
Multi-Factor Authentication (MFA): Ensuring sensitive data is only accessed by authorized persons.
- Advanced Firewalls & Intrusion Detection Systems (IDS) :Proactively recognizing and reducing risks.
Availability
Making certain that our platform is always available and functional with:- Robust Infrastructure:Using a redundant server architecture helps to avoid outages.
-
24/7 System Monitoring: Constant monitoring to find and fix performance problems.
- Disaster Recovery Plans:Techniques for restoring data in the event of malfunctions.
Processing Integrity
Ensuring the secure, dependable, and consistent handling of data by:- Automated Data Validation: Preventing errors and ensuring that transactions are accurate.
- Strict Change Management Policies: It ensure that security requirements are followed in updates and adjustments.
Confidentiality
Maintaining the confidentiality of critical user and corporate data by:- Role-Based Access Control (RBAC):Limiting access according to user roles.
- Non-Disclosure Agreements (NDAs): Making certain that third parties protect the privacy of data.
- Encrypted Backups:Safe backups to avoid losing data.
Privacy
Making certain that personal information is gathered, handled, and kept in accordance with privacy laws including the CCPA, GDPR, and SOC 2 privacy criteria by:- User Consent Management: Users can choose how they want their data to be used.
- Anonymization & Data Minimization:Getting only the information that is required.
- Privacy Policy Transparency:Having easily comprehensible privacy policies.
04.Data Retention & Secure Disposal
Data is only kept by MAWALOG for as long as is required to:
- Deliver services and fulfill regulatory requirements;
- Prevent fraud, maintain security, and satisfy legal requirements.
To ensure compliance with SOC 2 standards and regulatory requirements, we use secure data deletion techniques to completely remove business and personal data upon request or account termination.
05.Third-Party Risk Management
MAWALOG makes certain that all cloud service providers, third-party vendors, and service integrations adhere to SOC 2 compliance standards by:
- Performing security evaluations before to using third-party services.
- Making sure that SOC 2, GDPR, and other security standards are followed.
- Implementing vendor agreements that mandate adherence to data protection regulations.
06.Incident Response & Breach Notification
To identify, contain, and address security events, MAWALOG employs a systematic incident response plan. Our strategy consists of:
Proactive Threat Detection: Keeping an eye on systems for odd behavior.Immediate Investigation & Containment: Swiftly recognizing and reducing hazards.
User Notification:Notifying impacted users as soon as possible in accordance with legal regulations.
07.Ongoing Security Audits & Compliance Monitoring
In order to stay in compliance with SOC 2, MAWALOG does:
Regular Security Audits: Separate evaluations to examine security measures.Penetration Testing and Vulnerability Assessments: Locating and addressing vulnerabilities in the system.
Compliance Training: Ensuring that staff members comprehend and adhere to security best practices.
08.Your Rights & Data Protection Under SOC 2
MAWALOG is dedicated to providing people with authority over their personal information. Users are entitled to the following under SOC 2 compliance:
Request Information on Data Security Practices: Find out how your data is protected by MAWALOG.Request Secure Data Deletion: Have business or personal information safely deleted.
Verify System Integrity:Request security control and compliance reports.
09.Updates to This SOC 2 Compliance Statement
This statement may be updated by MAWALOG to reflect:
- New regulations or modifications to security policy;
- Improvements to data protection and compliance tactics.
Users will be informed of significant changes, and all updates will be posted on our website.
10. Contact Us
If you have any questions, concerns, or requests for data access regarding GDPR, please email us at support@mawalog.com Or Call us at +91-44-4856-3345.