Sorlute
Get in Touch

Security Policy

Last updated: February 24, 2025

Introduction

At Sorlute, we take the security of your information seriously. This Security Policy outlines the measures we implement to protect your data and maintain the integrity of our services.

Information Security

Data Protection Measures

We employ industry-standard security measures to protect your personal information from unauthorized access, disclosure, alteration, or destruction. These measures include:

  • Encryption of data in transit using secure socket layer technology
  • Encryption of sensitive data at rest
  • Regular security assessments and vulnerability testing
  • Access controls and authentication mechanisms
  • Secure backup and recovery procedures

Infrastructure Security

Our technical infrastructure is designed with security as a priority. We maintain secure servers, implement firewalls, and monitor our systems continuously for potential security threats.

Access Control

User Authentication

We implement secure authentication processes to verify user identity and prevent unauthorized access to accounts. Users are responsible for maintaining the confidentiality of their login credentials.

Internal Access

Access to your personal information is restricted to authorized personnel who require such access to perform their job functions. All personnel with access to sensitive data are bound by confidentiality obligations.

Data Transmission

When you transmit information to us through our website, we use encryption protocols to protect data during transmission. However, no method of electronic transmission is completely secure, and we cannot guarantee absolute security.

Third-Party Services

We carefully select third-party service providers and require them to implement appropriate security measures. We conduct due diligence to ensure that third parties handling your information maintain adequate security standards.

Security Incident Response

Monitoring and Detection

We actively monitor our systems for security incidents and employ detection mechanisms to identify potential threats or breaches.

Incident Handling

In the event of a security incident that affects your personal information, we will:

  • Assess the nature and scope of the incident
  • Take immediate steps to contain and mitigate the impact
  • Investigate the cause and implement corrective measures
  • Notify affected users in accordance with applicable legal requirements
  • Cooperate with relevant authorities as necessary

User Responsibilities

Users play an important role in maintaining security. You are responsible for:

  • Keeping your login credentials confidential
  • Using strong and unique passwords
  • Logging out of your account when using shared devices
  • Reporting suspicious activity or security concerns promptly
  • Keeping your contact information current for security notifications

Security Best Practices

Password Guidelines

We recommend that you create strong passwords that include a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable information such as birthdays or common words.

Account Security

Review your account activity regularly and report any unauthorized transactions or suspicious behavior immediately to contact@sorlute.com.

Software and System Updates

We regularly update our systems and software to address security vulnerabilities and implement enhanced security features. Maintenance may occasionally be required to apply critical security patches.

Data Retention and Disposal

We retain your information only for as long as necessary to fulfill the purposes outlined in our Privacy Policy. When data is no longer required, we securely delete or anonymize it using industry-standard disposal methods.

Compliance and Standards

We strive to comply with applicable data protection laws and industry security standards. Our security practices are designed to align with recognized frameworks and best practices.

Security Limitations

While we implement robust security measures, no system can be completely secure. We cannot guarantee that unauthorized access, hacking, data loss, or breaches will never occur. Users acknowledge and accept these inherent risks when using our services.

Reporting Security Vulnerabilities

If you discover a security vulnerability in our systems, we encourage responsible disclosure. Please report security issues to contact@sorlute.com with detailed information about the vulnerability. We request that you do not publicly disclose the issue until we have had an opportunity to address it.

Employee Training

Our team members receive regular training on security best practices, data protection principles, and incident response procedures to ensure they understand their role in maintaining security.

Physical Security

We maintain physical security controls for facilities where sensitive information is stored or processed, including access restrictions and environmental controls.

Policy Updates

We may update this Security Policy periodically to reflect changes in our security practices or legal requirements. The date at the top of this page indicates when the policy was last revised. Continued use of our services after changes constitutes acceptance of the updated policy.

Contact Information

If you have questions about our security practices or wish to report a security concern, please contact us at:

Email: contact@sorlute.com
Website: sorlute.com

Commitment to Security

Security is an ongoing priority at Sorlute. We continuously evaluate and enhance our security measures to protect your information and maintain your trust in our services.