Search
Close
SECURITY

SECURITY POLICY

COMMITMENT TO SECURITY

We are committed to maintaining a secure environment for all our users, clients, and partners. Our infrastructure and operations are designed to protect against unauthorized access, disclosure, alteration, or destruction of information.

DATA PROTECTION MEASURES

We implement a combination of technical, administrative, and physical security controls, including: SSL/TLS encryption for secure communication and data transfer Firewalls and intrusion detection systems to monitor and block malicious activities Secure data centers with controlled access Regular security audits and vulnerability assessments Strong password and authentication policies for all systems Access control management to limit data access to authorized personnel only

INFORMATION STORAGE AND TRANSMISSION

All personal and business data is stored securely on trusted servers. Sensitive data (such as payment or personal details) is encrypted during transmission using modern cryptographic protocols.We continuously monitor and update our systems to ensure data is handled securely at all times.

EMPLOYEE AND CONTRACTOR ACCESS

Access to sensitive information is strictly limited to authorized Xelo employees and contractors who require it to perform their duties. All team members are bound by confidentiality agreements and follow internal security guidelines.

INCIDENT RESPONSE

In the unlikely event of a data breach or security incident, we have a clear Incident Response Plan in place.This includes immediate investigation, mitigation steps, user notification (where applicable), and security reinforcement to prevent recurrence.

THIRD-PIRTY SERVICES

We carefully select third-party vendors and service providers that meet our security standards. Each partner is reviewed for compliance with industry best practices before integration or data sharing.

CLIENT RESPONSIBILITIES

While we take every precaution to safeguard data, clients also play an important role. We encourage users to: Use strong, unique passwords Keep login credentials confidential Log out after using shared or public devices Notify us immediately of any suspicious activity

CONTINUOUS IMPROVEMENT

We continuously update and enhance our security systems to adapt to evolving threats and technology standards. Security is an ongoing effort, and we remain proactive in maintaining the trust and safety of our clients.

Enter your email address below and we will send you a link to reset your password.