Security Policy
Last updated: September 6, 2025
At Vaskenud, we are committed to protecting the security and integrity of your personal information and data. This Security Policy outlines the measures we implement to safeguard your information when you use our online education platform and services.
1. Information Security Framework
We maintain a comprehensive information security framework designed to protect your data from unauthorized access, disclosure, alteration, or destruction. Our security practices align with industry-recognized standards and best practices for online service providers.
2. Data Protection Measures
2.1 Technical Safeguards
We employ multiple layers of technical security controls to protect your information:
- Encryption of data in transit using industry-standard TLS protocols
- Encryption of sensitive data at rest using strong encryption algorithms
- Secure authentication mechanisms including password hashing
- Regular security patches and updates to our systems and software
- Firewall protection and intrusion detection systems
- Secure backup procedures with encrypted storage
- Access controls limiting data access to authorized personnel only
2.2 Administrative Safeguards
Our organizational security measures include:
- Regular security awareness training for all team members
- Strict access control policies based on the principle of least privilege
- Background verification for personnel with access to sensitive data
- Confidentiality agreements with employees and contractors
- Incident response procedures and protocols
- Regular review and updating of security policies
2.3 Physical Safeguards
We ensure physical security through:
- Secure data center facilities with controlled access
- Environmental controls including fire suppression and climate management
- Video surveillance and monitoring systems
- Secure disposal procedures for hardware containing sensitive data
3. Account Security
3.1 Password Requirements
We implement strong password policies to protect your account:
- Minimum password length and complexity requirements
- Secure password storage using cryptographic hashing
- Password reset mechanisms with identity verification
- Recommendations for unique passwords not used on other services
3.2 User Responsibilities
You play a crucial role in maintaining the security of your account. You are responsible for:
- Maintaining the confidentiality of your login credentials
- Using strong, unique passwords for your account
- Logging out from shared or public devices
- Notifying us immediately of any unauthorized account access
- Keeping your contact information current for security notifications
- Not sharing your account credentials with others
4. Data Transmission Security
All data transmitted between your device and our servers is protected using:
- Transport Layer Security with strong cipher suites
- Certificate validation to prevent man-in-the-middle attacks
- Secure protocols for all sensitive transactions
- Regular security assessments of our transmission infrastructure
5. Third-Party Service Providers
When we engage third-party service providers who may access your data, we:
- Conduct due diligence on their security practices
- Require contractual commitments to maintain appropriate security standards
- Limit their access to only what is necessary for service delivery
- Monitor their compliance with security requirements
- Ensure they implement adequate safeguards for data protection
6. Vulnerability Management
We maintain an active vulnerability management program that includes:
- Regular security assessments and penetration testing
- Automated vulnerability scanning of our systems
- Timely application of security patches and updates
- Security code reviews for new features and functionality
- Monitoring of security advisories and threat intelligence
7. Incident Response
7.1 Security Incident Procedures
We have established procedures to respond to security incidents:
- Detection and monitoring systems to identify potential incidents
- Incident response team with defined roles and responsibilities
- Containment and remediation protocols
- Forensic analysis capabilities
- Documentation and reporting procedures
7.2 Breach Notification
In the event of a security breach that affects your personal information, we will:
- Investigate the incident promptly and thoroughly
- Take immediate steps to contain and remediate the breach
- Notify affected users within a reasonable timeframe
- Provide information about the nature of the breach and data affected
- Offer guidance on steps you can take to protect yourself
- Comply with applicable notification requirements
8. Application Security
Our platform is developed with security in mind:
- Secure coding practices following industry standards
- Input validation and sanitization to prevent injection attacks
- Protection against common web vulnerabilities
- Regular security testing during development cycles
- Secure session management and authentication flows
- Content Security Policy implementation
9. Data Retention and Deletion
We implement secure data retention and deletion practices:
- Data is retained only for as long as necessary for stated purposes
- Secure deletion procedures that render data unrecoverable
- Regular purging of unnecessary or outdated data
- Documented retention schedules for different data types
10. Monitoring and Logging
We maintain security monitoring and logging systems to:
- Detect unusual or suspicious activity
- Track access to sensitive data and systems
- Support incident investigation and forensic analysis
- Maintain audit trails for security-relevant events
- Comply with regulatory and contractual requirements
11. Payment Security
For payment processing, we adhere to strict security standards:
- Use of trusted payment processors with robust security measures
- Non-storage of complete payment card information on our servers
- Secure tokenization of payment information
- Compliance with payment card industry standards where applicable
- Encrypted transmission of all payment data
12. Network Security
Our network infrastructure is protected through:
- Network segmentation to isolate critical systems
- Firewall rules restricting unauthorized access
- Intrusion detection and prevention systems
- Regular network security assessments
- Secure configuration of network devices
- DDoS protection mechanisms
13. Security Awareness and Training
We invest in ongoing security education:
- Regular security training for all personnel
- Specialized training for technical staff
- Security awareness programs covering current threats
- Simulated phishing exercises to test preparedness
- Updates on new security policies and procedures
14. Compliance and Certifications
We strive to maintain compliance with relevant security standards and frameworks. Our security program is regularly reviewed and updated to align with evolving best practices and requirements.
15. Limitations
While we implement robust security measures, please understand that:
- No system can guarantee absolute security
- Internet transmission carries inherent risks
- User actions can impact account security
- Security threats constantly evolve requiring ongoing vigilance
We cannot guarantee that unauthorized access, hacking, data loss, or breaches will never occur, but we commit to maintaining industry-standard security practices and responding promptly to any incidents.
16. Security Updates and Improvements
We continuously enhance our security posture through:
- Regular review of security policies and procedures
- Adoption of new security technologies
- Response to emerging threats and vulnerabilities
- Integration of lessons learned from security incidents
- Participation in security communities and information sharing
17. Reporting Security Concerns
We encourage responsible disclosure of security vulnerabilities. If you discover a potential security issue with our platform, please contact us immediately at:
Email: info@vaskenud.com
Please provide detailed information about the vulnerability to help us address it quickly. We request that you:
- Do not access or modify data belonging to others
- Do not perform actions that could harm our services or users
- Give us reasonable time to address the issue before public disclosure
- Act in good faith to avoid privacy violations and service disruption
18. Contact Information
For questions or concerns about our security practices, please contact us:
Vaskenud
Kniaziv Koriatovychiv St, 28/28, офис 8
Vinnytsia, Vinnytsia Oblast
Ukraine, 21000
Phone: +380668398343
WhatsApp: +380668398343
Email: info@vaskenud.com
19. Changes to This Security Policy
We may update this Security Policy periodically to reflect changes in our security practices, technology, or legal requirements. We will post the updated policy on our website with a revised last updated date. Continued use of our services after changes constitute acceptance of the updated Security Policy.
This Security Policy demonstrates our commitment to protecting your information and maintaining the trust you place in us. We take security seriously and continuously work to safeguard your data while you use our educational platform.