TOD 360 AI ยท
Trust & Safety

Security at TOD 360 AI

How we protect your organisation's data and employee information

Security is fundamental to TOD 360 AI. Your data โ€” including sensitive employee activity, HR records, and payroll information โ€” is protected at every layer of our infrastructure.

Security Pillars

๐Ÿ”’

Encryption in Transit

All communication is encrypted using TLS 1.2/1.3. HTTPS is enforced on every endpoint โ€” no unencrypted connections are accepted.

๐Ÿ›ก๏ธ

Encryption at Rest

Passwords are hashed with bcrypt (cost factor 12). Sensitive tokens and API keys are stored encrypted. Database backups are encrypted.

๐Ÿ—๏ธ

Cloud Infrastructure

Hosted on AWS (Mumbai region โ€” ap-south-1). Data stays within India. We use VPC isolation, private subnets, and security groups with minimum-access rules.

๐ŸŽญ

Access Control

Role-based access (Owner, Admin, Manager, Employee). Each role sees only what it needs. All admin actions are logged in an immutable audit trail.

๐Ÿ”‘

Authentication Security

Brute-force protection, session fixation prevention, CSRF tokens on all state-changing requests, and secure session management with HTTP-only cookies.

๐Ÿ’ณ

Payment Security

All payments processed by Razorpay (PCI-DSS Level 1 compliant). We never store full card numbers. Webhook signatures are verified cryptographically.

๐Ÿ”

Input Validation

All database queries use parameterised prepared statements โ€” no raw SQL string concatenation. All user input is validated and sanitised server-side.

๐Ÿ“‹

Audit Logging

Administrative actions (login, data export, configuration changes, impersonation) are recorded with timestamps, IP addresses, and actor identity.

Infrastructure Security

Network

Application Server

Database

Desktop Agent Security

The Windows desktop monitoring agent is designed with privacy and security in mind:

Multi-Tenant Data Isolation

TOD 360 AI is a multi-tenant platform. Data isolation between organisations is enforced at every layer:

Shared Responsibility Model

Security is a shared responsibility between RDBYTES and our customers.

We are responsible forYou are responsible for
Infrastructure and server securityStrong passwords and credential management
Application-level security (auth, CSRF, SQL injection prevention)Promptly revoking access for departed employees
Data encryption in transit and at restSecuring admin account credentials
Regular security patches and updatesReporting suspicious activity to us
Backup and disaster recoveryCompliance with local monitoring and privacy laws
Payment processing security (via Razorpay PCI-DSS)Obtaining employee consent before monitoring

Incident Response

In the event of a security incident that affects your data:

Responsible Disclosure

If you discover a security vulnerability in TOD 360 AI, we ask that you disclose it responsibly. Please email us at support@tod360ai.com with:

We will acknowledge your report within 2 business days and aim to resolve confirmed vulnerabilities within 30 days. We ask that you do not publicly disclose the vulnerability until we have addressed it.

We do not currently offer a bug bounty programme, but we deeply appreciate responsible security research and will acknowledge contributions publicly (with your permission).

Security Contact

For security concerns, vulnerability reports, or security-related questions: