1. Security Framework
WatsBridge implements a security program aligned with recognized industry standards and best practices, including principles derived from ISO/IEC 27001, without constituting formal certification.
2. Access Control
Access to production systems is restricted to authorized personnel on a need-to-know basis.
Authentication and authorization mechanisms are implemented to prevent unauthorized access.
The Client remains responsible for securing its own systems and credentials.
3. Data Protection
Data transmitted through the Services is protected using standard encryption protocols during transit.
Certain processing operations may involve Third-Party Services beyond the direct control of WatsBridge.
4. Logging and Monitoring
WatsBridge maintains logs of system activity, including access logs, message logs, and operational events.
Such logs may be used for:
- security analysis,
- anomaly detection,
- performance monitoring,
- evidentiary purposes.
5. Incident Response
WatsBridge maintains internal processes for detecting, analyzing, and responding to security incidents.
However, no guarantee is provided regarding detection time, response time, or remediation time.
6. Residual Risk
The Client acknowledges that no system can be completely secure and accepts the residual risk inherent in the use of digital services.
