Last updated: 14 January 2026
Introduction
This Security Policy describes the technical and organizational measures implemented by verejan.com (“we”, “us”, or “our”) to protect the confidentiality, integrity, and availability of information and systems associated with our website, services, and digital infrastructure.
It explains how we safeguard user data, prevent unauthorized access, detect security incidents, and respond to threats in compliance with industry standards and applicable regulations.
By using verejan.com, you acknowledge and accept the security practices described in this policy.
Scope
This policy applies to:
-
All users of verejan.com
-
All data processed through our Website and Services
-
All employees, contractors, and service providers with system access
-
All infrastructure supporting verejan.com, including servers, databases, APIs, and third-party services
Information Protection
We protect both personal and non-personal data using layered security controls.
Types of Data Protected
-
Personal data (such as name, email address, or account identifiers)
-
Authentication data and session information
-
System logs and metadata
-
Uploaded content and user-generated data
Security Measures
We implement reasonable and appropriate technical and organizational measures, including but not limited to:
Technical Measures
-
Encrypted communication using HTTPS (TLS)
-
Secure authentication and authorization mechanisms
-
Regular system updates and security patches
-
Firewalls, rate limiting, and intrusion detection
-
Access controls based on least-privilege principles
-
Secure backups and disaster recovery mechanisms
Organizational Measures
-
Restricted internal access to systems and data
-
Role-based access for administrators and staff
-
Security awareness for personnel with system access
-
Vendor and third-party risk management
Access Control
Access to sensitive systems and data is limited to authorized personnel only. All access is logged and monitored.
We use strong authentication methods and protect credentials from unauthorized disclosure.
Monitoring and Incident Detection
We continuously monitor our infrastructure for:
-
Unauthorized access attempts
-
Suspicious activity
-
Service disruptions
-
Data integrity violations
When an incident is detected, we follow internal procedures to assess, contain, and remediate the issue.
Incident Response
In the event of a security incident, we will:
-
Investigate and contain the issue
-
Mitigate potential damage
-
Restore system functionality
-
Notify affected users and authorities when legally required
Data Retention and Disposal
We retain data only as long as necessary for operational, legal, and security purposes. When data is no longer required, it is securely deleted or anonymized.
Third-Party Security
We work only with third-party service providers that maintain appropriate security standards. We require contractual obligations for confidentiality and data protection.
Limitations
While we implement strong security measures, no system can be guaranteed to be 100% secure. Users are responsible for maintaining the confidentiality of their login credentials and securing their own devices.
Changes to This Policy
We may update this Security Policy periodically. Changes will be published on the Website and take effect upon posting.
We encourage users to review this policy regularly.
Contact
If you have questions or concerns regarding security, please contact us through the official contact channels listed on verejan.com.