Security
At Top Viso, security is foundational -- not an afterthought. We protect your data with enterprise-grade infrastructure, rigorous processes, and continuous monitoring.
SOC 2 Type II
Audited annually
GDPR
Fully compliant
CCPA
Fully compliant
Encryption
All data is encrypted both at rest and in transit. We use industry-standard encryption protocols to ensure your information remains protected at every stage.
At Rest
AES-256 encryption for all stored data, including databases, backups, and file storage. Encryption keys are managed through a dedicated key management service with automatic rotation.
In Transit
TLS 1.3 enforced on all connections. We support only modern cipher suites and enforce HSTS with a minimum one-year policy. All API endpoints require HTTPS.
Infrastructure Security
Our infrastructure is designed with defense-in-depth principles, incorporating multiple layers of security controls to protect against threats.
- --Hosted on SOC 2-certified cloud infrastructure with isolated virtual private clouds.
- --Network segmentation with strict firewall rules and least-privilege access policies.
- --Automated intrusion detection and real-time monitoring of all production systems.
- --Immutable infrastructure with automated patching and zero-downtime deployments.
- --Comprehensive audit logging with tamper-proof storage and retention policies.
Access Control
We enforce strict access controls to ensure that only authorized personnel can access sensitive systems and data.
- --Role-based access control (RBAC) across all internal systems.
- --Multi-factor authentication (MFA) required for all employee accounts.
- --Just-in-time access provisioning for production environments.
- --Quarterly access reviews and automatic deprovisioning for offboarded employees.
Penetration Testing
We conduct regular penetration testing through independent third-party security firms. Testing covers our web application, API endpoints, infrastructure, and mobile integrations. All findings are triaged, remediated, and verified within defined SLAs. Critical and high-severity vulnerabilities are addressed within 24 and 72 hours respectively. We also run continuous automated vulnerability scanning across our entire attack surface.
Data Handling
We follow strict data handling practices to minimize risk and protect your information throughout its lifecycle.
- --Data classification policies that categorize information by sensitivity level.
- --Automated data retention and deletion workflows.
- --Secure data disposal procedures for decommissioned systems and storage media.
- --Regular backups with encrypted off-site storage and tested recovery procedures.
Incident Response
We maintain a documented incident response plan that outlines procedures for detecting, containing, and recovering from security incidents. Our security team is available 24/7 and follows established escalation procedures. In the event of a data breach affecting your information, we will notify you within 72 hours in accordance with applicable regulations. Post-incident reviews are conducted to identify root causes and implement preventive measures.
Responsible Disclosure Program
We value the work of security researchers and welcome responsible disclosure of vulnerabilities. If you believe you have found a security issue in our Services, we encourage you to report it to us. We ask that you:
- --Provide a detailed description of the vulnerability, including steps to reproduce.
- --Allow us reasonable time to investigate and address the issue before public disclosure.
- --Avoid accessing or modifying other users' data during your research.
- --Act in good faith and comply with all applicable laws.
We will not take legal action against researchers who follow these guidelines. We are committed to working with the security community to keep our platform safe.
Report a Vulnerability
If you have discovered a security vulnerability, please report it directly to our security team. We aim to acknowledge all reports within one business day and provide an initial assessment within five business days.
Top Viso INC -- Security Team
Email: info@donkeyideas.com
Please include "Security Disclosure" in the subject line. Encrypt sensitive details when possible.