Security Policy
This Security Policy (“Policy”) describes the technical and organizational measures implemented by BetBhai Information Hub (“we,” “us,” or “our”) to protect all data processed on https://betbhaiid.com/ (“Website”).
1. Objective
Our objective is to maintain the confidentiality, integrity, and availability of information collected or transmitted through this Website in accordance with the Digital Personal Data Protection Act 2023 (India) and international best practices.
2. Scope
This Policy applies to all users, employees, contractors, and third parties who access or interact with our Website or systems. It complements our Privacy Policy and Data Protection Policy.
3. Information Security Principles
Our security framework is based on the following principles:
- Integrity: Ensuring information is accurate and unaltered.
- Confidentiality: Restricting access to authorized individuals only.
- Availability: Ensuring services and data remain accessible to legitimate users.
4. Technical Safeguards
- All data transmissions are protected via SSL/TLS encryption.
- Servers are secured behind firewalls and regularly patched to mitigate vulnerabilities.
- Data backups are performed periodically and stored in encrypted form.
- We employ malware scanning, intrusion detection, and two-factor authentication for administrative access.
5. Organizational Safeguards
- Employee access is restricted on a “need-to-know” basis.
- Security awareness training is provided to authorized staff.
- Third-party vendors are required to follow equivalent security standards and sign data-processing agreements.
6. Incident Response
We maintain a structured Incident Response Procedure to detect, report, and remediate security breaches. In the event of a confirmed incident, affected users and authorities will be notified in accordance with legal obligations.
7. Data Encryption and Storage
Personal information and communication logs are stored on encrypted servers. Sensitive identifiers (such as email or phone numbers) are hashed or tokenized before transmission whenever possible.
8. Third-Party Integrations
Any analytics or plugin tools we employ (e.g., traffic analytics, anti-spam services) are vetted for compliance with global security frameworks such as ISO 27001 or SOC 2. Details of third-party data handling are available in our Privacy Policy.
9. Physical Security
Hosting data centers implement 24×7 surveillance, biometric access controls, and redundant power systems. Only authorized personnel can access physical hardware containing user data.
10. Risk Management
Risk assessments are conducted regularly to identify emerging threats and update security controls accordingly. High-impact risks are mitigated through layered defense mechanisms and strict monitoring.
11. User Responsibility
While we maintain robust protections, users also share responsibility for maintaining account security by:
- Using strong, unique passwords;
- Not sharing login credentials via email or chat;
- Logging out after each session;
- Reporting suspicious activity to support@betbhaiid.com.
12. Vulnerability Disclosure
We welcome responsible reporting of security vulnerabilities. Researchers may contact us directly. Verified reports will be investigated promptly and, when confirmed, patched without delay.
13. Data Retention and Disposal
Data is retained only for the period necessary to fulfill its purpose. Upon expiry, it is deleted or anonymized using secure wiping techniques. See our Data Protection Policy for retention timelines.
14. Compliance Monitoring
We routinely audit systems to ensure adherence to applicable regulations and internal controls. Non-compliance, if detected, is addressed through corrective measures and retraining.
15. Changes to This Policy
This Policy may be updated periodically to align with evolving laws, technologies, and practices. Revised versions will be posted on this page.
16. Related Policies
By using our Website, you acknowledge that you have read and agree to this Security Policy.
 
								