Doroxenth

Security Policy

Last Updated: January 26, 2025

At Doroxenth, we are committed to protecting the security and integrity of our platform and the data entrusted to us by our users. This Security Policy outlines our approach to safeguarding information, maintaining system security, and responding to potential security incidents.


1. Information Security Framework

1.1 Security Standards

We implement industry-standard security practices and controls to protect our systems and user data. Our security framework is continuously evaluated and updated to address emerging threats and vulnerabilities.

1.2 Security Objectives


2. Data Protection Measures

2.1 Encryption

We employ encryption technologies to protect data both in transit and at rest:

2.2 Data Storage Security

Our data storage infrastructure implements multiple layers of security including:


3. Access Control

3.1 Authentication

We implement secure authentication mechanisms including:

3.2 Authorization

Access to systems and data is controlled through:

3.3 Administrative Access

Access to administrative functions and sensitive systems is restricted to authorized personnel only and subject to:


4. Network Security

4.1 Infrastructure Protection

Our network infrastructure is protected through:

4.2 DDoS Protection

We implement distributed denial of service protection measures including traffic filtering, rate limiting, and redundant infrastructure to maintain service availability.


5. Application Security

5.1 Secure Development

Our development practices incorporate security throughout the software lifecycle:

5.2 Input Validation

All user inputs are validated and sanitized to prevent common vulnerabilities including injection attacks, cross-site scripting, and other malicious exploits.

5.3 Third-Party Components

We regularly assess and update third-party libraries and components to address known vulnerabilities and maintain security compliance.


6. Monitoring and Incident Response

6.1 Security Monitoring

We continuously monitor our systems for security threats and suspicious activities through:

6.2 Incident Response Plan

We maintain a comprehensive incident response plan that includes:

6.3 Incident Notification

In the event of a security incident that may affect user data or account security, we will notify affected users in accordance with applicable laws and regulations. Notifications will include information about the nature of the incident, potential impact, and recommended actions.


7. Business Continuity

7.1 Backup and Recovery

We maintain regular backup procedures to ensure data availability and business continuity:

7.2 Disaster Recovery

Our disaster recovery plan addresses potential disruptions to our services and includes procedures for restoring operations in a timely manner.


8. Employee Security

8.1 Security Awareness

All employees and contractors receive security awareness training covering:

8.2 Background Checks

We conduct appropriate background checks on employees and contractors with access to sensitive systems or data, in accordance with applicable laws.


9. Vendor and Third-Party Security

9.1 Vendor Assessment

We evaluate the security practices of third-party vendors and service providers who process or have access to user data. Vendors are required to maintain appropriate security measures consistent with this policy.

9.2 Contractual Requirements

Agreements with third-party vendors include security and confidentiality provisions, and vendors are required to notify us of any security incidents affecting our data.


10. Compliance and Auditing

10.1 Security Audits

We conduct regular internal security audits and may engage independent third parties to perform security assessments and penetration testing.

10.2 Compliance Monitoring

We monitor compliance with security policies and procedures through automated tools and manual reviews.


11. User Responsibilities

11.1 Account Security

Users are responsible for maintaining the security of their accounts by:

11.2 Reporting Security Issues

Users should report any security vulnerabilities, suspicious activities, or potential security incidents to our security team.


12. Vulnerability Disclosure

12.1 Responsible Disclosure

We welcome reports of security vulnerabilities from security researchers and users. If you discover a security issue, please report it to us through our designated security contact.

12.2 Disclosure Guidelines

When reporting security vulnerabilities:


13. Updates to Security Practices

We continuously review and update our security practices to address new threats, technologies, and regulatory requirements. Significant changes to our security measures will be reflected in updates to this policy.


14. Contact Information

For security-related inquiries, to report security incidents, or to disclose vulnerabilities, please contact us at:

Email: contact@doroxenth.com
Address: Vörösmarty u. 4, 7621 Pécs, Hungary
Phone: +36 22 379 604

When contacting us about security matters, please include detailed information to help us understand and address your concern promptly.


15. Limitation of Liability

While we implement comprehensive security measures, no system can be completely secure. We cannot guarantee absolute security and are not liable for unauthorized access resulting from circumstances beyond our reasonable control. Users should maintain their own security practices and backups of important data.


Effective Date: This Security Policy is effective as of the last updated date specified above and applies to all users of the Doroxenth platform.