Data Security

Last updated: 12-05-2024

At Jada, we are committed to protecting the security of our platform, users' data, and transactions. This Security Policy outlines the measures we take to safeguard your information and maintain a secure environment for both drivers and passengers.

1. Data Encryption

We use industry-standard encryption protocols to protect your data:

  • SSL/TLS Encryption: All data transmitted between your device and Jada servers is secured using SSL (Secure Socket Layer) or TLS (Transport Layer Security) encryption. This ensures that personal and payment information is protected during transmission.
  • Database Encryption: Sensitive data, such as passwords and payment details, are stored in an encrypted format in our databases, preventing unauthorized access.

2. User Authentication

We implement strong authentication measures to ensure that only authorized users can access their accounts:

  • Passwords: Users are required to create strong passwords when registering for Jada. We encourage the use of alphanumeric and special characters to enhance security.
  • Multi-Factor Authentication (MFA): For added protection, users may be required to enable multi-factor authentication, combining something they know (password) with something they have (such as a phone code).
  • Session Management: Jada automatically logs out users after periods of inactivity to reduce the risk of unauthorized access.

3. Regular Security Audits

To maintain the highest level of security, Jada undergoes regular internal and external security audits:

  • Vulnerability Scanning: We perform routine scans to identify potential vulnerabilities in our platform and promptly address any issues.
  • Penetration Testing: Jada conducts penetration testing to simulate real-world attacks and ensure the robustness of our security measures.
  • Third-Party Security Reviews: We partner with third-party security experts to review and strengthen our security practices regularly.

4. Data Access Control

We enforce strict data access controls to prevent unauthorized individuals from accessing sensitive information:

  • Role-Based Access: Only authorized personnel with the appropriate clearance can access certain data or system functions. Access is limited based on role, ensuring that employees only have access to what is necessary for their job functions.
  • Monitoring and Logging: All user activities on Jada, including access to sensitive information, are logged and monitored for suspicious behaviour. In the event of a breach or misuse, we can take swift action.

5. Payment Security

We prioritize the safety of your financial information:

  • PCI-DSS Compliance: Jada adheres to the Payment Card Industry Data Security Standard (PCI-DSS), ensuring that your credit card and payment details are processed and stored securely.
  • Tokenization: We use tokenization to replace sensitive payment information with a unique identifier (token). This token is used for transaction purposes without exposing your actual card details.
  • Fraud Prevention: Jada uses advanced fraud detection systems to identify and prevent unauthorized or suspicious transactions.

6. Security Incident Response

In the event of a security incident, Jada has a structured response plan in place:

  • Incident Detection: We continuously monitor our systems for potential threats or breaches using real-time alerting tools.
  • Incident Response Team: Our dedicated incident response team investigates and mitigates any potential security threats. If a breach occurs, we take immediate steps to contain the incident and minimize its impact.
  • User Notification: If your data has been compromised, Jada will notify you as soon as possible, providing details of the incident and recommended actions to protect yourself further.

7. User Responsibilities

While Jada takes extensive measures to secure the platform, users also play a role in maintaining security:

  • Password Protection: Keep your password confidential and avoid sharing it with others. Use a unique password for Jada and change it regularly.
  • Device Security: Ensure that your device is protected with up-to-date antivirus software and avoid using public or unsecured Wi-Fi networks when accessing your Jada account.
  • Phishing Awareness: Be cautious of phishing attempts or unsolicited communications requesting your Jada credentials. Jada will never ask for your password or personal information via email.

8. Ongoing Security Updates

Jada is committed to staying ahead of security threats and continually improves its security practices:

  • Software Updates: We regularly update our platform to address potential vulnerabilities, including installing security patches and enhancing overall system resilience.
  • Employee Training: All Jada employees undergo regular security training to stay informed about best practices, new threats, and proper handling of sensitive data.

9. Contact Us

If you have any concerns or questions about Jada's security practices, or if you suspect any unauthorized access to your account, please contact us immediately:

Email: security@jada.com
Address: Jada Official Office
Phone: +234567890

By using Jada, you acknowledge that while no system can guarantee complete security, we take every reasonable measure to protect your data and provide a secure platform.