Security Policy

Effective Date: 28 April 2026

Security Policy

Applies To: HelloGeo software, websites, cloud platforms, mobile applications, APIs, command systems, customer portals, infrastructure, and managed deployments.


HelloGeo is committed to maintaining the confidentiality, integrity, and availability of customer data, operational systems, and digital services. This Security Policy outlines the controls, practices, and responsibilities used to safeguard our technology ecosystem.

Security Objectives

  • Protect customer and company data
  • Prevent unauthorized access
  • Maintain system availability
  • Detect and respond to threats
  • Support regulatory and contractual obligations
  • Continuously improve resilience

Governance & Responsibility

Security oversight is maintained by authorized management, technology, and operations personnel. Employees, contractors, and partners must comply with applicable security controls.

  • Security policy enforcement
  • Risk management
  • Vendor oversight
  • Incident management
  • Access governance
  • Security awareness

Information Classification

Information may be classified into: Public, Internal, Confidential, Restricted / Sensitive. Security controls are applied based on classification level.

  • Customer project files
  • Infrastructure maps
  • Credentials
  • Source code
  • Commercial contracts
  • Drone mission data
  • Personal information

Access Control

We apply least-privilege and role-based access principles.

  • Unique user accounts
  • Strong passwords
  • Multi-factor authentication (where supported)
  • Role-based permissions
  • Session controls
  • Access review cycles
  • Timely deprovisioning

Network Security

  • Firewalls
  • Network segmentation
  • Secure VPN access
  • Intrusion detection / prevention tools
  • Rate limiting
  • Traffic monitoring
  • DDoS mitigation

Application Security

  • Secure development lifecycle
  • Code review
  • Dependency management
  • Patching
  • Secrets management
  • Vulnerability remediation
  • Logging and monitoring
  • Environment separation (dev/test/prod)

Data Protection

  • Encryption in transit (TLS where supported)
  • Encryption at rest where applicable
  • Access logging
  • Backup retention controls
  • Secure deletion processes
  • Data minimization practices

Vulnerability Management

  • Routine patching
  • Dependency updates
  • Misconfiguration review
  • Security scanning
  • Penetration testing (where applicable)
  • Prioritized remediation based on severity

Incident Response

HelloGeo maintains procedures for responding to suspected or confirmed incidents.

  • Identification
  • Containment
  • Investigation
  • Eradication
  • Recovery
  • Lessons learned

Customer Responsibilities

  • Protect credentials
  • Use supported software versions
  • Configure permissions responsibly
  • Secure endpoints and networks
  • Review logs where available
  • Notify HelloGeo of suspicious activity promptly

Responsible Disclosure

If you discover a potential security vulnerability affecting HelloGeo systems, please report it responsibly to security@hellogeo.world. Please include: affected system or URL, reproduction steps, impact description, and screenshots/logs if available. Do not exploit vulnerabilities or access data without authorization.

Disclaimer

This policy describes general practices and does not create a warranty, guarantee, or contractual SLA unless expressly agreed in a signed agreement.

Contact

Security Office — HelloGeo Technologies Pvt. Ltd.
Email: security@hellogeo.world