Privacy Policy

Our obligation to protect your data.

Hablo Global Platform Privacy and Cyber Security Statement

1. Introduction

Hablo Global is committed to maintaining the highest standards of integrity and professionalism in our relationship with you. As part of this commitment, we are dedicated to protecting the privacy, security, and ownership of the data you entrust to us. This “Privacy and Cyber Security Statement” outlines our approach to managing your data with the utmost care and in compliance with applicable laws and regulations. This document is designed to inform you of your rights and our responsibilities, ensuring transparency and building trust in our processes and systems.

2. Data Ownership

We recognize that our customers own their personal and transactional data. This includes any information provided by the users, data created through the use of our services, and data input manually by the users into any of our systems or applications. Customers retain ownership rights to their data as prescribed by applicable laws.

3. Data Usage

The data provided by our clients and users is primarily used to facilitate the provision of our services. Hablo Global may also use this data in an anonymized form to improve our service offerings, perform analysis to enhance user experience, and fulfill our legal and regulatory obligations. We do not share, sell, or lease customer data to third parties for their marketing purposes without explicit consent from our customers. Third parties may include technology providers operating and maintaining our platform.

4. Privacy

We are committed to protecting the privacy of our customers. Our data collection is limited to what is necessary to provide and improve our services. We outline in clear terms how we collect, use, and store our customers’ information. Customers have the right to request access to their personal information and can ask for corrections or deletion as per the data protection laws applicable in their jurisdiction.

5. Data Security

To prevent unauthorized access, data breaches, and ensure data integrity, we employ robust cybersecurity measures including, but not limited to, encryption, firewalls, and secure server facilities. Our security policies are regularly reviewed and updated to adapt to new threats.

6. Cybersecurity Measures

a) Data Encryption: We encrypt data both at rest and in transit to ensure that even if data is intercepted or accessed without authorization, it remains unreadable and secure.

b) Access Controls: We implement strict access controls and authentication procedures, such as multi-factor authentication (MFA), to ensure that only authorized personnel can access sensitive data.

c) Regular Security Audits and Penetration Testing: We conduct regular security audits and penetration tests to identify and mitigate vulnerabilities within our network and systems before they can be exploited by attackers.

d) Secure Software Development Lifecycle (SDLC): We integrate security into the software development lifecycle to identify security vulnerabilities early in the development process and ensure that security is a priority throughout the development of applications.

e) Network Security Measures: We utilize firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to monitor and protect the network from unauthorized access and threats.

f) Data Backup and Recovery: We regularly back up data and have an effective disaster recovery plan to ensure that we can restore data in case of a cyber attack or other data loss event.

g) Security Awareness Training: We provide ongoing training for employees about the latest cybersecurity threats and best practices to help prevent security breaches caused by human error.

h) Endpoint Protection: We use antivirus software, anti-malware programs, and other security tools on all devices that access our network to protect against threats.

i) Cloud Security: We implement security configurations, compliance audits, and cloud-specific security tools to safeguard data stored in the cloud.

j) Incident Response Plan: We have a detailed incident response plan to address and manage the aftermath of a security breach or cyber attack effectively.