1. Introduction WiseYield ("we," "us," or "our") takes data security seriously. This Data Security Policy outlines the technical, administrative, and physical safeguards we implement to protect your personal and agricultural data from unauthorized access, disclosure, alteration, or destruction.
This policy applies to all data processed by WiseYield, including personal information, farm data, and system information. It complements our Privacy Policy and Terms of Service .
2. Security Framework Our security program is built on industry-recognized frameworks and best practices:
ISO 27001: Information Security Management System (ISMS) principlesNIST Cybersecurity Framework: Identify, Protect, Detect, Respond, RecoverOWASP Top 10: Web application security best practicesGDPR & CCPA: Data protection and privacy compliance3. Technical Security Measures Encryption In Transit: TLS 1.3 encryption for all data transmissionAt Rest: AES-256 encryption for stored dataDatabase: Encrypted databases with column-level encryption for sensitive fieldsBackups: Encrypted backup storageKeys: Hardware Security Modules (HSM) for key managementAccess Control Authentication: Multi-factor authentication (MFA) required for all accountsAuthorization: Role-Based Access Control (RBAC)Principle of Least Privilege: Minimal access rightsSession Management: Automatic session expiration after inactivityPassword Policy: Strong password requirements, bcrypt hashingInfrastructure Security Cloud Provider: AWS/Google Cloud with SOC 2 Type II certificationNetwork Segmentation: Isolated production, staging, development environmentsFirewalls: Web Application Firewall (WAF) and network firewallsDDoS Protection: Cloudflare Enterprise protectionIntrusion Detection: Real-time threat monitoring (IDS/IPS)Monitoring & Logging 24/7 Monitoring: Continuous security event monitoringAudit Logs: Comprehensive logging of all system access and changesSIEM: Security Information and Event Management systemLog Retention: Logs retained for 1 year minimumAnomaly Detection: AI-powered threat detectionApplication Security ✓ Input validation and sanitization ✓ SQL injection prevention (parameterized queries) ✓ Cross-Site Scripting (XSS) protection ✓ Cross-Site Request Forgery (CSRF) tokens ✓ Secure headers (CSP, HSTS, X-Frame-Options) ✓ API rate limiting and throttling ✓ Regular dependency updates and vulnerability scanning ✓ Secure coding practices (OWASP guidelines) 4. Administrative Security Measures 4.1 Employee Security Background Checks: Pre-employment screening for all employeesSecurity Training: Mandatory security awareness training for all staffConfidentiality Agreements: NDAs and data protection agreementsAccess Reviews: Quarterly access rights reviewsOffboarding: Immediate access revocation upon termination4.2 Vendor Management Due Diligence: Security assessments for all third-party vendorsData Processing Agreements (DPAs): GDPR-compliant contractsRegular Audits: Periodic vendor security reviewsSubprocessor List: Maintained and publicly available4.3 Incident Response Incident Response Team (IRT): Dedicated security response teamPlaybooks: Documented procedures for common security incidentsResponse Time: Critical incidents addressed within 1 hourPost-Incident Review: Root cause analysis and remediation5. Physical Security While WiseYield leverages cloud infrastructure, our office and data center security includes:
Data Centers: Tier III/IV facilities with 24/7 security guardsAccess Control: Biometric authentication and badge systemsSurveillance: CCTV monitoring and recordingEnvironmental Controls: Fire suppression, climate control, redundant powerSecure Disposal: Certified data destruction for decommissioned hardware6. Data Backup and Recovery Backup Strategy Frequency: Continuous incremental backups, daily full backupsRetention: 30-day rolling window, monthly archives for 1 yearGeographic Redundancy: Backups stored in multiple regionsEncryption: All backups encrypted at restTesting: Monthly disaster recovery drillsRTO/RPO: Recovery Time Objective: 4 hours | Recovery Point Objective: 1 hour7. Security Testing and Audits Regular Testing • Quarterly penetration testing by third-party firms • Weekly automated vulnerability scans • Annual security audits (SOC 2 Type II) • Continuous code security analysis (SAST/DAST) Bug Bounty Program We operate a responsible disclosure program. Security researchers are encouraged to report vulnerabilities:
security@wiseyield.co
8. Data Breach Notification Procedures In the unlikely event of a data breach affecting personal information:
Our Commitment Within 72 hours: Notify affected users and relevant supervisory authorities (GDPR requirement)Transparency: Provide clear information about the nature of the breach, affected data, and potential risksRemediation: Detail steps taken to contain the breach and prevent recurrenceSupport: Offer identity protection services if applicableTo report a suspected security vulnerability, contact us immediately at security@wiseyield.co .
9. Compliance and Certifications WiseYield maintains compliance with:
SOC 2 Type II
Security Controls
10. Your Security Responsibilities Security is a shared responsibility. You can help protect your account by:
Using strong, unique passwords (minimum 12 characters with mixed case, numbers, symbols) Enabling multi-factor authentication (MFA) Keeping your password confidential and not sharing account access Logging out after using shared devices Reporting suspicious activity immediately Keeping your contact information up to date Reviewing account activity regularly Using secure, updated browsers and operating systems 11. Reporting Security Issues If you discover a security vulnerability or suspect unauthorized access:
🔒 Security Team Email: security@wiseyield.co
Response Time: Critical issues addressed within 1 hour, other reports within 24 hours
Please do not publicly disclose security vulnerabilities until we have had a chance to investigate and remediate.
12. Policy Updates This Data Security Policy may be updated to reflect changes in our security practices, technology, or regulatory requirements. Material changes will be communicated via email or prominent notice. The "Last Updated" date indicates the most recent revision.
13. Contact Us For questions about our security practices: