Security Policy

Effective Date: 1st September 2024

1: Introduction

At Thrillium, we are committed to protecting the security and integrity of your information. This Security Policy outlines the measures we take to safeguard our website, www.thrillium.io (the "Site"), and the data you entrust to us.

2. Data Protection

a. Encryption

We use advanced encryption technologies to protect data transmitted between your browser and our servers. All sensitive data, including personal information and financial transactions, is encrypted using SSL/TLS protocols.

b. Data Storage

Data is stored securely using industry-standard security practices. Access to stored data is restricted to authorized personnel only, and it is protected by firewalls and other security measures.

3. Access Control

a. User Authentication

We implement robust authentication mechanisms to ensure that only authorized users can access their accounts. This includes strong password policies and, where applicable, multi-factor authentication (MFA).

b. Employee Access

Access to sensitive systems and data is restricted to authorized employees who require it for their job functions. Regular audits and access reviews are conducted to ensure compliance.

4. Network Security

a. Firewalls

Our network infrastructure is protected by firewalls that monitor and control incoming and outgoing traffic based on predefined security rules. This helps to prevent unauthorized access to our systems.

b. Intrusion Detection Systems

We use intrusion detection and prevention systems (IDPS) to monitor network traffic for signs of suspicious activity or potential threats. These systems alert us to any anomalies or attacks.

5. Security Monitoring and Response

a. Monitoring

Our systems are continuously monitored for security threats. We use automated tools and manual reviews to detect and respond to potential security incidents promptly.

b. Incident Response

In the event of a security breach or incident, we have a defined incident response plan in place. This includes immediate containment, investigation, and remediation measures, as well as communication with affected parties as necessary.

6. Software and System Updates

We regularly update our software, systems, and applications to address security vulnerabilities and ensure that we are protected against the latest threats. This includes applying security patches and updates in a timely manner.

7. Data Backup

Regular backups of critical data are performed to ensure that we can recover information in the event of data loss or corruption. Backups are stored securely and tested regularly to ensure their integrity.

8. User Responsibilities

a. Secure Credentials

Users are responsible for maintaining the confidentiality of their account credentials and for any activity that occurs under their account. We recommend using strong, unique passwords and enabling multi-factor authentication where available.

b. Reporting Security Issues

If you suspect any security vulnerabilities or notice any suspicious activity related to your account, please report it to us immediately at [email protected].

9. Third-Party Security

a. Vendor Management

We evaluate and select third-party vendors based on their security practices and compliance with our security standards. Third-party service providers must adhere to strict security requirements to ensure the protection of your data.

b. External Audits

Our systems and security practices are subject to periodic external audits to ensure compliance with industry standards and best practices.

10. Policy Review and Updates

This Security Policy is reviewed and updated periodically to reflect changes in our security practices, technology, and regulatory requirements. We will notify you of any significant changes by posting the updated policy on this Site.

11. Contact Information

If you have any questions about these Terms of Use, please contact us at:
Thrillium Support Team
Email: [email protected]
627, Madame Street, Mississauga, ON L5W 1G6, Canada
Thank you for using Thrillium!