Data security
Sirwaji applies organizational and technical safeguards to protect appointment, customer, and operational data.
Last updated: February 18, 2026
1) Access and identity protection
- Role-based access and least-privilege principles.
- Session handling and authentication checks.
- Access review and revocation workflows.
2) Encryption and secure transport
- TLS-protected communications for web and API traffic.
- Protection of sensitive secrets and credentials.
- Production hardening and secure configuration baselines.
3) Monitoring and resilience
Security logging
Monitoring of critical events such as login attempts and sensitive actions.
Operational alerts
Service health tracking and alerting for key runtime conditions.
Vulnerability management
Patch management and prioritized remediation based on severity.
Backup and recovery
Periodic backups and tested restoration processes for continuity.
4) Incident response
Sirwaji follows a defined incident process: assessment, containment, corrective action, and required notifications under applicable law.
5) Tenant responsibilities
- Use strong credentials and manage team access responsibly.
- Control recipients of notifications and quality of stored data.
- Apply any sector-specific legal duties relevant to your business.