Last Updated: January 1, 2026
1. Our Commitment to Data Protection
Data protection is a core principle of our Platform architecture. We are designed with
"security-by-design" principles, meaning security is built into every layer of the system,
not added as an afterthought.
Your travel agency data is sensitive and critical to your business. We treat it with the same
rigor that financial institutions apply to protecting customer money.
✓ Security Standards: We follow industry best practices including OWASP guidelines,
secure coding standards, and regular security audits.
2. Access Control & Authorization
Every user action in the Platform is controlled by role-based permissions. No one can access
or modify data they don't have authorization to see.
Role-Based Permissions
- Tenant Super Admin: Full control. Can access all data, manage users, configure settings
- Admin: System administration. Can manage users and branches within their scope
- Finance: Financial data only. Cannot modify operational booking data
- Sales: Booking and client data. Cannot access financial records
- Umrah: Umrah family and group data only
Branch-Level Isolation
- Users can only access data from branches they are assigned to
- Cross-branch data access is restricted unless explicitly authorized
- Branch managers cannot see another branch's financial data or client information
- Tenant Super Admin can see consolidated data across all branches
Admin & Finance Edit Restrictions
- Admins cannot modify financial records (prevents internal fraud)
- Finance users cannot delete operational data (maintains data integrity)
- Critical actions require confirmation to prevent accidental damage
3. Encryption & Data Protection
Data is protected at every stage — transmission, storage, and processing.
🔒 Secure Authentication
Industry-standard password hashing. Optional two-factor authentication (2FA) support for maximum security.
🔐 Encrypted Data Storage
Sensitive data encrypted at rest using AES-256 encryption. Encryption keys are managed securely.
🚨 TLS/SSL in Transit
All data in transit uses HTTPS/TLS 1.2 or higher. No data transmitted in plain text.
🛡️ Protection Against Attacks
Protections against SQL injection, XSS, CSRF, and other common web vulnerabilities.
Password Security
- Passwords must meet minimum complexity requirements
- Password reset tokens expire after 24 hours
- Users are encouraged to enable two-factor authentication
- Failed login attempts are logged and tracked
4. Multi-Branch Data Isolation
Each branch operates in a controlled, isolated environment while sharing agency-level configuration.
- Separate Operational Data: Each branch's ticket, client, and booking records are isolated
- Shared Configuration: Agency settings (SMTP, WhatsApp, currency) are shared for consistency
- Central Visibility: Tenant Super Admin has visibility into all branches for consolidated reporting
- Data Ownership: Your agency owns all data. We cannot access or view your records without permission
⚠️ Important for Multi-Branch Agencies: If a branch employee should not see another
branch's data, ensure they are assigned to their specific branch only. Multi-branch access must be
explicitly authorized by Tenant Super Admin.
5. Automation Safety & Tracking
Automation features (email, WhatsApp, reminders) are designed with built-in safeguards.
WhatsApp & Email Automation
- Messages use approved templates — no uncontrolled content
- Recipient lists are controlled and verified
- Failed messages are recorded and retried appropriately
- All messages are logged with delivery status
Message Delivery Logs
- Every email and WhatsApp sent is logged with timestamp, recipient, status
- Failed sends are tracked for investigation
- You can audit all outbound communications
- Logs are retained for compliance purposes
Failure Handling
- SMTP failures are recorded and reported
- WhatsApp API failures trigger alerts
- Automatic retry with exponential backoff for transient failures
6. Incident Response
In the event of a security incident, we follow a structured response process to minimize impact.
Our Incident Response Process
- Detection: Continuous monitoring and alert systems detect potential incidents
- Immediate Review: Security team conducts immediate investigation
- Impact Assessment: We determine what data (if any) was affected
- Containment: Affected systems are isolated to prevent further damage
- Corrective Action: Technical fixes are deployed to resolve the issue
- User Notification: If your data was affected, you will be notified within 24-48 hours
- Post-Incident Review: We conduct a full review to prevent recurrence
✓ Transparency Commitment: We will be honest and transparent about any security incidents.
We will not cover up or minimize incidents.
7. Compliance & Auditability
Our system is built to support compliance with financial, data protection, and travel industry regulations.
Core Compliance Features
- Audit Logs: Every action (login, data change, report access) is logged with user, timestamp, IP
- Change Tracking: What changed, who changed it, when, and from where
- Financial Accuracy: All transactions recorded for audit and reconciliation
- User Activity Reports: Track individual user activity for accountability
- Export Compliance: Generate audit reports for external auditors
Regulations We Support
- Financial audit requirements (balance sheets, transaction records)
- Tax compliance (invoices, payment records, financial reports)
- Data protection regulations (data access logs, consent tracking)
- Travel industry specific requirements (booking records, client communication logs)
✓ Audit-Ready: The system is designed to make external audits simpler and faster.
All audit logs are exportable in standard formats.
Final Note
Complete Legal Documentation
Review our other legal documents to fully understand your privacy rights and platform usage.