📘 Clipster – Security & Data Protection Policy

Last Updated: 14 January 2026
Operated by Axxoraa Private Limited

  1. Introduction

Clipster is committed to protecting the security and privacy of our users' data. This Security & Data Protection Policy outlines the technical, administrative, and physical safeguards we implement to protect information across our platform.

  1. Security Governance

2.1 Security Organization

2.2 Security Framework

Clipster follows:

  1. Data Classification & Handling

3.1 Data Categories

3.2 Handling Requirements

Each data category has specific:

  1. Access Control

4.1 Principle of Least Privilege

4.2 Authentication Standards

4.3 Third-Party Access

  1. Encryption Standards

5.1 Data in Transit

5.2 Data at Rest

5.3 End-to-End Encryption

  1. Network Security

6.1 Infrastructure Security

6.2 Network Monitoring

6.3 Web Application Firewall (WAF)

  1. Application Security

7.1 Secure Development Lifecycle

7.2 Vulnerability Management

7.3 API Security

  1. Physical Security

8.1 Cloud Infrastructure Security

8.2 Office Security

  1. Incident Response

9.1 Incident Classification

9.2 Response Timeline

9.3 Notification Requirements

  1. Data Protection

10.1 Privacy by Design

10.2 Data Subject Rights

10.3 Data Processing Agreements

  1. Business Continuity & Disaster Recovery

11.1 Backup Strategy

11.2 Recovery Objectives

11.3 Testing Schedule

  1. Employee Security

12.1 Security Training

12.2 Policies & Agreements

  1. Third-Party Risk Management

13.1 Vendor Assessment

13.2 Contractual Requirements

  1. Compliance & Auditing

14.1 Regular Audits

14.2 India-Specific Compliance

  1. Security Monitoring

15.1 Continuous Monitoring

15.2 Key Metrics Monitored

  1. User Security Features

16.1 Account Security

16.2 Privacy Controls

  1. Breach Response Plan

17.1 Immediate Actions

  1. Activate incident response team
  2. Contain the breach
  3. Preserve evidence
  4. Assess impact

17.2 Communication Plan

17.3 Remediation Steps

17.4 Incident Response Documentation

**18. Data Breach Notification Procedure**

18.1 Compliance Monitoring

18.2 Violation Consequences

  1. Policy Review & Updates

19.1 Review Schedule

19.2 Change Management

20. Contact Information

Security Team

Data Protection Officer (DPO)

Law Enforcement