Security Policy

Effective Date: January 22, 2026

Last Updated: January 22, 2026

This Security Policy outlines the security measures implemented by Innuvatori Ltd (“Company,” “we,” “our,” “us”) to protect your data and ensure the security of the design and planning services for homes, apartments, 3D visualization, and turnkey design solutions and the services we provide. We are committed to safeguarding your information and preventing unauthorized access, disclosure, alteration, and destruction of data.

  1. Data Protection and Security Measures

We take data protection seriously and have implemented a variety of security measures to safeguard the integrity and confidentiality of your data. These measures include, but are not limited to:

Encryption: All sensitive data is encrypted using industry-standard encryption methods (such as SSL/TLS) during transmission and at rest.

Access Control: Access to personal data and critical systems is restricted to authorized personnel only. Employees and contractors must adhere to strict confidentiality agreements.

Multi-factor Authentication: We require multi-factor authentication (MFA) for accessing sensitive systems and data.

Data Minimization: We collect only the minimum amount of personal data required to provide our services, in accordance with GDPR guidelines.

  1. Infrastructure Security

We maintain secure, reliable, and robust infrastructure to ensure the stability and security of our platform:

Firewall Protection: We utilize firewalls and intrusion detection systems to protect our network from unauthorized access and potential threats.

Secure Hosting: Our platform is hosted in a secure, monitored data center that follows industry best practices for physical and network security.

Regular Security Audits: We conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in our infrastructure.

  1. Application Security

We follow industry best practices for developing and maintaining secure applications:

Code Reviews and Testing: All code is reviewed for security vulnerabilities before being deployed. We perform regular security testing, including penetration testing, to identify and resolve potential issues.

Secure Software Development Lifecycle (SDLC): Our development process includes secure coding practices to minimize security risks during software development.

Patch Management: We maintain an active patch management process to ensure that all systems and applications are up to date with the latest security patches.

  1. Data Privacy Compliance

We are committed to complying with data privacy laws and regulations, including the General Data Protection Regulation (GDPR), to ensure that your personal data is processed in a lawful, fair, and transparent manner.

Data Access and Control: You have the right to access, modify, or delete your personal data as specified in our Privacy Policy.

Data Retention: We retain your personal data only for as long as necessary to fulfill the purposes for which it was collected, and in accordance with legal and regulatory requirements.

Data Breach Response: In the event of a data breach, we will notify affected individuals within 72 hours of becoming aware of the breach, in compliance with GDPR.

  1. Employee Training and Awareness

We provide regular security awareness training to our employees to ensure they understand and follow best practices for data security and privacy:

Training Programs: Employees receive ongoing training on security best practices, including data protection, phishing awareness, and safe use of company systems.

Incident Response: We have a well-defined incident response plan in place, which includes steps for identifying, managing, and mitigating security incidents.

  1. Third-Party Service Providers

We may use third-party service providers to assist in delivering our services, such as hosting, payment processing, and analytics. We require all third-party providers to meet strict security and privacy standards and to ensure that they adhere to data protection and security protocols that are consistent with our own.

Due Diligence: We perform regular due diligence on third-party providers to ensure they comply with relevant security and privacy requirements.

Contracts and Agreements: We include security and confidentiality clauses in our contracts with third-party providers to ensure that they are held accountable for their data protection practices.

  1. Incident Response and Reporting

In the event of a security incident, we have procedures in place to promptly respond, contain, and resolve the issue. Our incident response plan includes:

Detection and Identification: We monitor our systems for unusual activity that may indicate a security breach.

Containment: If an incident is detected, we work swiftly to contain the breach and minimize its impact.

Resolution and Recovery: We implement corrective actions to resolve the incident and restore normal operations as quickly as possible.

Notification: We notify affected parties, including clients and regulators, in accordance with applicable laws and regulations.

  1. User Responsibilities

While we take significant steps to protect your data, you also have a role in maintaining security:

Password Management: You are responsible for creating strong, unique passwords for your accounts and keeping them secure.

Access Control: You should not share your login credentials with anyone and must immediately notify us if you suspect any unauthorized access to your account.

System Updates: Ensure that any software you use to access our platform is regularly updated to protect against security vulnerabilities.

  1. Security Updates

We are committed to continuously improving our security measures. As new threats and vulnerabilities emerge, we update our security protocols and systems to address these risks. We will notify you of any significant changes to our security practices that may affect your use of our services.

  1. Changes to This Security Policy

We may update this Security Policy periodically to reflect changes in security practices, technology, or legal requirements. Any updates will be posted on this page with the updated “Effective Date.” We encourage you to review this policy regularly to stay informed about how we protect your data.

  1. Contact Information

If you have any questions about this Security Policy or if you wish to report a security concern, please contact us:

Innuvatori Ltd

Registered Address: Alexandrou Ypsilanti, 15A, 7103, Larnaca, Cyprus

Email: innuvatori@gmail.com

Sign In