Logo MTravels
  • Home
  • Features
  • How It Works
  • About
  • Contact
Login Book a Demo

Data Protection & Security

How we protect your travel agency data

Last Updated: January 1, 2026

📋 Contents

  • Our Commitment
  • Access Control
  • Encryption & Protection
  • Multi-Branch Isolation
  • Automation Safety
  • Incident Response
  • Compliance Focus

1. Our Commitment to Data Protection

Data protection is a core principle of our Platform architecture. We are designed with "security-by-design" principles, meaning security is built into every layer of the system, not added as an afterthought.

Your travel agency data is sensitive and critical to your business. We treat it with the same rigor that financial institutions apply to protecting customer money.

✓ Security Standards: We follow industry best practices including OWASP guidelines, secure coding standards, and regular security audits.

2. Access Control & Authorization

Every user action in the Platform is controlled by role-based permissions. No one can access or modify data they don't have authorization to see.

Role-Based Permissions

  • Tenant Super Admin: Full control. Can access all data, manage users, configure settings
  • Admin: System administration. Can manage users and branches within their scope
  • Finance: Financial data only. Cannot modify operational booking data
  • Sales: Booking and client data. Cannot access financial records
  • Umrah: Umrah family and group data only

Branch-Level Isolation

  • Users can only access data from branches they are assigned to
  • Cross-branch data access is restricted unless explicitly authorized
  • Branch managers cannot see another branch's financial data or client information
  • Tenant Super Admin can see consolidated data across all branches

Admin & Finance Edit Restrictions

  • Admins cannot modify financial records (prevents internal fraud)
  • Finance users cannot delete operational data (maintains data integrity)
  • Critical actions require confirmation to prevent accidental damage

3. Encryption & Data Protection

Data is protected at every stage — transmission, storage, and processing.

🔒 Secure Authentication

Industry-standard password hashing. Optional two-factor authentication (2FA) support for maximum security.

🔐 Encrypted Data Storage

Sensitive data encrypted at rest using AES-256 encryption. Encryption keys are managed securely.

🚨 TLS/SSL in Transit

All data in transit uses HTTPS/TLS 1.2 or higher. No data transmitted in plain text.

🛡️ Protection Against Attacks

Protections against SQL injection, XSS, CSRF, and other common web vulnerabilities.

Password Security

  • Passwords must meet minimum complexity requirements
  • Password reset tokens expire after 24 hours
  • Users are encouraged to enable two-factor authentication
  • Failed login attempts are logged and tracked

4. Multi-Branch Data Isolation

Each branch operates in a controlled, isolated environment while sharing agency-level configuration.

  • Separate Operational Data: Each branch's ticket, client, and booking records are isolated
  • Shared Configuration: Agency settings (SMTP, WhatsApp, currency) are shared for consistency
  • Central Visibility: Tenant Super Admin has visibility into all branches for consolidated reporting
  • Data Ownership: Your agency owns all data. We cannot access or view your records without permission
⚠️ Important for Multi-Branch Agencies: If a branch employee should not see another branch's data, ensure they are assigned to their specific branch only. Multi-branch access must be explicitly authorized by Tenant Super Admin.

5. Automation Safety & Tracking

Automation features (email, WhatsApp, reminders) are designed with built-in safeguards.

WhatsApp & Email Automation

  • Messages use approved templates — no uncontrolled content
  • Recipient lists are controlled and verified
  • Failed messages are recorded and retried appropriately
  • All messages are logged with delivery status

Message Delivery Logs

  • Every email and WhatsApp sent is logged with timestamp, recipient, status
  • Failed sends are tracked for investigation
  • You can audit all outbound communications
  • Logs are retained for compliance purposes

Failure Handling

  • SMTP failures are recorded and reported
  • WhatsApp API failures trigger alerts
  • Automatic retry with exponential backoff for transient failures

6. Incident Response

In the event of a security incident, we follow a structured response process to minimize impact.

Our Incident Response Process

  • Detection: Continuous monitoring and alert systems detect potential incidents
  • Immediate Review: Security team conducts immediate investigation
  • Impact Assessment: We determine what data (if any) was affected
  • Containment: Affected systems are isolated to prevent further damage
  • Corrective Action: Technical fixes are deployed to resolve the issue
  • User Notification: If your data was affected, you will be notified within 24-48 hours
  • Post-Incident Review: We conduct a full review to prevent recurrence
✓ Transparency Commitment: We will be honest and transparent about any security incidents. We will not cover up or minimize incidents.

7. Compliance & Auditability

Our system is built to support compliance with financial, data protection, and travel industry regulations.

Core Compliance Features

  • Audit Logs: Every action (login, data change, report access) is logged with user, timestamp, IP
  • Change Tracking: What changed, who changed it, when, and from where
  • Financial Accuracy: All transactions recorded for audit and reconciliation
  • User Activity Reports: Track individual user activity for accountability
  • Export Compliance: Generate audit reports for external auditors

Regulations We Support

  • Financial audit requirements (balance sheets, transaction records)
  • Tax compliance (invoices, payment records, financial reports)
  • Data protection regulations (data access logs, consent tracking)
  • Travel industry specific requirements (booking records, client communication logs)
✓ Audit-Ready: The system is designed to make external audits simpler and faster. All audit logs are exportable in standard formats.

Final Note

🔒 Trust, Control & Scalability

Our Platform is built for trust, control, and scalability — ensuring agencies can operate confidently while protecting their data and clients.

For security questions or to report a vulnerability, contact us at allahdadmuhammadi01@gmail.com

Complete Legal Documentation

Review our other legal documents to fully understand your privacy rights and platform usage.

Terms & Conditions Privacy Policy

MTravels

Professional travel agency management platform designed to optimize workflows, enhance customer service, and drive business growth through comprehensive automation and intelligent insights.

Product

  • Features
  • Pricing
  • Security

Company

  • About Us
  • Blog

Support

  • Contact Support
  • System Status

© 2026 MTravels. All rights reserved.

Privacy Policy | Terms & Conditions | Data Protection