Security

Information Security Policy

Wiztech Limited ("Wiztech", "we", "our", or "us") is committed to protecting information, systems, and data against unauthorized access, misuse, disclosure, alteration, or destruction. This Information Security Policy outlines the principles and measures we apply to maintain the confidentiality, integrity, and availability of information.

1. Purpose

The purpose of this Policy is to:

  • Protect company and user information;
  • Reduce cybersecurity risks;
  • Maintain secure systems and infrastructure;
  • Support compliance with legal and regulatory obligations;
  • Promote security awareness and best practices.

2. Scope

This Policy applies to:

  • Our website and digital services;
  • Employees, contractors, and service providers;
  • Systems, devices, applications, and infrastructure managed by Wiztech.

3. Security Principles

We implement appropriate technical and organizational security measures designed to protect information against:

  • Unauthorized access;
  • Data loss;
  • Misuse;
  • Cyberattacks;
  • Accidental disclosure or destruction.

Security controls may include:

  • Access management;
  • Authentication measures;
  • Encryption technologies;
  • Network and infrastructure security;
  • Monitoring and logging;
  • Backup and recovery procedures.

4. Access Control

Access to systems and data is restricted to authorized individuals with a legitimate business need. We apply measures such as:

  • Role-based access controls;
  • Password and authentication requirements;
  • Least privilege principles;
  • Periodic access reviews.

5. Data Protection

We are committed to protecting personal and confidential information in accordance with applicable data protection laws, including GDPR where applicable. Personal data is processed:

  • Lawfully;
  • Securely;
  • Only for legitimate business purposes.

6. Infrastructure and Hosting Security

We utilize commercially reasonable security practices and may rely on reputable third-party hosting and infrastructure providers to maintain system security and reliability. Security measures may include:

  • Firewall protections;
  • DDoS mitigation;
  • Secure cloud infrastructure;
  • Traffic filtering and monitoring.

7. Incident Management

We maintain procedures for identifying, assessing, and responding to security incidents. In the event of a security incident, we may:

  • Investigate and contain the issue;
  • Mitigate potential risks;
  • Notify affected parties and authorities where legally required.

8. Third-Party Providers

Third-party vendors and service providers may have access to systems or data only where necessary and subject to appropriate security and confidentiality obligations.

9. Security Awareness

We support security awareness and encourage personnel to follow cybersecurity best practices, including:

  • Secure password management;
  • Phishing awareness;
  • Safe handling of sensitive information.

10. Continuous Improvement

We continuously review and improve our security measures to address evolving threats, technologies, and regulatory requirements.

11. Limitation of Liability

While we implement reasonable security measures, no system or method of electronic transmission or storage is completely secure. Accordingly, we cannot guarantee absolute security.

12. Changes to This Policy

We may update this Information Security Policy from time to time. Updates will be published on this page with a revised “Last updated” date.

13. Contact

For security-related inquiries you can reach out to legal@wiztechgroup.com.

Last updated: 19 May 2026