Security Practices

How Tenanting protects data, systems, and platform integrity.

Tenanting is committed to protecting the confidentiality, integrity, and availability of information processed on the Tenanting platform. This page outlines the security practices and controls implemented to safeguard personal data, platform systems, and user activity.

These practices are designed in alignment with applicable Indian laws, including the Digital Personal Data Protection Act, 2023 (DPDP Act), and follow generally accepted industry standards.

1. Security by Design

Security is integrated into the design and development of the Tenanting platform. Controls are implemented at multiple layers to reduce risk and limit the impact of potential threats.

2. Access Control

  • Role-based access controls restrict data access based on user role
  • Authentication mechanisms protect user accounts
  • Administrative access is limited to authorized personnel only
  • Session controls are used to prevent unauthorized access

3. Data Encryption

Tenanting applies appropriate encryption mechanisms to protect data during transmission and storage.

  • Encrypted communication channels for data in transit
  • Secure storage practices for sensitive information

4. Infrastructure Security

Platform infrastructure is protected through layered controls designed to prevent unauthorized access and service disruption.

  • Firewall and network security configurations
  • Isolation of application components where appropriate
  • Monitoring for abnormal or suspicious activity

5. Application Security

The Tenanting application is developed using secure coding practices to reduce vulnerabilities.

  • Input validation and sanitization
  • Protection against common web application threats
  • Controlled use of third-party libraries and services

6. Data Minimization & Purpose Limitation

Personal data collected on the Platform is limited to what is necessary for defined and lawful purposes.

Access to personal data is restricted to the minimum required to perform platform functions.

7. Monitoring & Logging

Tenanting maintains system logs and monitoring mechanisms to:

  • Detect unauthorized access attempts
  • Identify operational issues
  • Support audit and compliance requirements

8. Incident Management

Security incidents are handled through defined internal procedures aimed at containment, assessment, and remediation.

Where required by law, affected users and authorities may be notified of relevant data breaches.

9. Third-Party Security

Where Tenanting engages third-party service providers, reasonable steps are taken to ensure that such providers implement appropriate security measures.

10. User Responsibilities

Users play an important role in maintaining security. Users are responsible for:

  • Keeping login credentials confidential
  • Using strong passwords
  • Reporting suspicious activity promptly

11. Continuous Improvement

Tenanting regularly reviews and improves its security practices to address evolving threats, technology changes, and regulatory requirements.

12. Contact for Security Concerns

Security-related concerns or vulnerability reports may be shared with Tenanting at:

Email: security@tenanting.in

Last updated: February 2026