Bosla ERP Logo

Security Policy

Last Updated: January 25, 2026

1. Introduction

At Bosla ERP, we take the security of your data and our platform seriously. This Security Policy outlines the measures we implement to protect your information and ensure the integrity, confidentiality, and availability of our cloud-based ERP service.

This policy should be read in conjunction with our Privacy Policy and Terms of Service.

2. Data Encryption

2.1 Encryption in Transit

All data transmitted between your devices and our servers is encrypted using industry-standard Transport Layer Security (TLS) protocols, typically TLS 1.2 or higher. This ensures that:

  • All communications are protected from interception
  • Data integrity is maintained during transmission
  • Your connection to our Service is authenticated

2.2 Encryption at Rest

All data stored on our servers is encrypted at rest using strong encryption algorithms (AES-256 or equivalent). This includes:

  • Business data (accounting, CRM, HR records)
  • User account information
  • Backup data and archives
  • Log files and audit trails

3. Access Controls and Authentication

We implement multiple layers of access controls to protect your data:

3.1 User Authentication

  • Strong password requirements and policies
  • Multi-factor authentication (MFA) support
  • Session management and timeout controls
  • Account lockout after failed login attempts

3.2 Role-Based Access Control (RBAC)

Our platform supports granular role-based access controls, allowing you to:

  • Define custom roles and permissions
  • Control access to specific modules and features
  • Restrict data access based on user roles
  • Audit user access and activities

3.3 Employee Access

Our employees only have access to customer data when necessary for:

  • Providing technical support (with your explicit permission)
  • Resolving service issues
  • Complying with legal obligations

All employee access is logged, monitored, and requires appropriate authorization.

4. Infrastructure Security

4.1 Cloud Infrastructure

Our Service is hosted on reputable cloud infrastructure providers that maintain industry-leading security standards. We leverage:

  • Redundant data centers with high availability
  • Physical security controls at data center facilities
  • Network segmentation and firewalls
  • DDoS protection and mitigation
  • Regular security audits and compliance certifications

4.2 Network Security

  • Firewalls and intrusion detection systems (IDS)
  • Regular security scanning and vulnerability assessments
  • Network monitoring and anomaly detection
  • Secure API endpoints with rate limiting

5. Data Backup and Recovery

We maintain comprehensive backup and disaster recovery procedures:

  • Automated Backups: Regular automated backups of all customer data
  • Backup Retention: Backups are retained according to our data retention policy
  • Geographic Redundancy: Backups are stored in multiple geographic locations
  • Recovery Testing: Regular testing of backup and recovery procedures
  • Recovery Time Objectives (RTO): We aim to restore service within defined timeframes

6. Security Monitoring and Incident Response

6.1 Continuous Monitoring

We continuously monitor our systems for:

  • Unauthorized access attempts
  • Suspicious activities or anomalies
  • System vulnerabilities and threats
  • Performance and availability issues

6.2 Incident Response

In the event of a security incident, we have procedures in place to:

  • Immediately contain and mitigate the threat
  • Investigate the root cause
  • Notify affected customers as required by law
  • Implement corrective measures to prevent recurrence
  • Document the incident and lessons learned

7. Compliance and Certifications

We are committed to maintaining compliance with relevant security standards and regulations, including:

  • General Data Protection Regulation (GDPR) compliance
  • Industry-standard security best practices
  • Regular security audits and assessments
  • Third-party security certifications (as applicable)

8. Vulnerability Management

We maintain a proactive vulnerability management program:

  • Regular security assessments and penetration testing
  • Automated vulnerability scanning
  • Timely patching of identified vulnerabilities
  • Security updates and patches applied according to risk priority
  • Responsible disclosure program for security researchers

9. Your Security Responsibilities

While we implement robust security measures, you also play a crucial role in protecting your data:

  • Use strong, unique passwords for your account
  • Enable multi-factor authentication (MFA) when available
  • Keep your account credentials confidential
  • Regularly review and manage user access permissions
  • Monitor your account for suspicious activity
  • Keep your devices and browsers updated with security patches
  • Use secure networks when accessing the Service
  • Report any security concerns or suspicious activity immediately

10. Reporting Security Issues

If you discover a security vulnerability or have security concerns, please report them to us immediately at:

Email: [email protected]

Please include:

  • Description of the security issue
  • Steps to reproduce (if applicable)
  • Potential impact
  • Your contact information

We take all security reports seriously and will investigate and respond promptly.

11. Updates to This Policy

We may update this Security Policy from time to time to reflect changes in our security practices, technology, or legal requirements. We will notify you of material changes by posting the updated policy on this page and updating the "Last Updated" date.

12. Contact Us

If you have any questions about this Security Policy or our security practices, please contact us at:

Email: [email protected]