Security

At Howsit AI, protecting your data and ensuring the confidentiality, integrity, and availability of our platform is a top priority. This Security Policy explains how we safeguard information, manage risks, and maintain a secure environment for all users.

By using Howsit AI, you agree to the practices described in this policy.


1. Physical Security

Howsit AI’s infrastructure is hosted with industry-leading cloud providers that maintain comprehensive physical security controls, including:

  • 24/7 controlled access to data centres

  • Surveillance systems and intrusion detection

  • Redundant power, cooling, and fire suppression systems

  • Environmental monitoring

These measures help protect servers, storage systems, and networking equipment from unauthorised access or physical threats.


2. Network & Infrastructure Security

We employ robust network protections such as:

  • Firewall systems and intrusion prevention tools

  • Segregation of sensitive systems and services

  • Regular network monitoring and threat detection

  • Anti-DDoS defenses to protect against volumetric attacks

Network security controls are continuously evaluated and improved to respond to emerging threats.


3. Data Encryption

Data in Transit

All communications between your device and Howsit AI services use industry-standard encryption (such as TLS/SSL) to protect data from interception during transmission.

Data at Rest

Sensitive data stored in our systems is encrypted using strong encryption algorithms to protect against unauthorised access.

Encryption keys are managed securely in accordance with best practices.


4. Application Security

Our engineering and security teams follow secure development practices to minimise vulnerabilities:

  • Static and dynamic code analysis

  • Regular dependency and library vulnerability scanning

  • Secure-by-design principles

  • Release testing and approval prior to deployment

We also conduct internal and external security reviews to ensure applications are robust and resilient.


5. Identity and Access Management

Howsit AI implements strict access controls for both internal systems and user accounts:

  • Role-based access permissions

  • Multi-factor authentication (MFA) for administrative access

  • Password policies that enforce complexity and rotation

  • Least-privilege access principles

Only authorised personnel with valid business reasons can access production systems or sensitive user data.


6. Monitoring & Incident Response

We operate continuous monitoring systems to detect and respond to potential security events.

In the event of a suspected breach or security incident, we:

  1. Activate our Incident Response Team

  2. Contain and investigate the event

  3. Remediate vulnerabilities

  4. Communicate with affected parties as required

We also maintain logs for audit, compliance, and forensic purposes.


7. Vulnerability Disclosure & Responsible Disclosure

At Howsit AI, we support responsible security research.

If you identify a potential vulnerability in our platform, please report it securely to:

Security Contact: security@howsit.ai 

Please include:

  • A detailed description of the issue

  • Steps to reproduce

  • Any relevant screenshots or evidence

We will acknowledge your report and work to address it promptly.


8. Data Backups & Availability

To ensure service continuity and mitigate data loss, we maintain:

  • Regular encrypted backups

  • Redundant storage and failover systems

  • Retention policies aligned with data protection regulations

These measures help maintain availability and recoverability in the event of system failure or disruption.


9. Third-Party & Vendor Security

We leverage trusted third-party services (such as cloud hosting, analytics, and identity providers) that meet recognised security standards.

Before onboarding vendors, we evaluate:

  • Security controls and certifications

  • Data handling and retention practices

  • Compliance with privacy and data protection regulations

Third-party access to systems and data is restricted and monitored.


10. Compliance & Certifications

Howsit AI operates with a commitment to compliance with applicable laws and regulations, which may include:

  • POPIA (Protection of Personal Information Act, South Africa)

  • GDPR (General Data Protection Regulation, EU)

  • International security best practices

Where relevant, we align with industry standards and frameworks to uphold security and privacy compliance.


11. Employee Training & Awareness

Security is everyone’s responsibility. All Howsit AI personnel complete regular training on:

  • Information security principles

  • Data protection and privacy requirements

  • Threat awareness

  • Secure coding and operational practices

Ongoing training ensures our team remains current with evolving risks.


12. Updates to This Policy

We may update this Security Policy to reflect changes in technology, legal requirements, or internal practices.

The latest version will be posted on our website with a revised effective date.

Your continued use of the Service after updates means you accept the revised policy.


Contact Us

If you have questions about this Security Policy or want to report a security concern, contact:

Howsit AI
Website: https://howsit.ai
Address:1 Bridgeway Road, Bridgeways Precinct, Century City, Cape Town, 7441