Security — Itqan

System security in brief

At Itqan, we take the security of your data seriously. We are committed to a safe, dependable experience. Our services use modern technology and widely accepted practices to help protect personal information and files you upload.

Security standards

We align with ISO/IEC 27001 guidance and up-to-date information security management practices.

Data protection

Encryption & safeguards

Transport encryption

Data sent to and from our service is protected with industry-standard SSL/TLS where applicable.

Secure storage

Files are processed on reliable infrastructure with regular backups as appropriate to the service.

Key & secret handling

We apply strong operational practices for secrets, keys, and access to systems that handle your data.

Secure deletion

We delete temporary and processed data according to our internal policies, using methods appropriate to the environment.

Privacy principles

Account & platform protections

Two-factor authentication (2FA)

When enabled, 2FA adds a second check to your account using a code or device you control.

Password recovery

A structured flow to restore access to your account if you forget your password—without weakening security.

Sessions

We use session security measures to reduce the risk of unauthorized use when you are signed in.

Sign-in and activity awareness

We record important security-relevant events to help us investigate unusual activity and improve protection.

Infrastructure

Area Status Details
Network firewalls Active Perimeter and segmentation controls to filter traffic.
Intrusion detection & prevention Monitoring Capabilities to detect and help block malicious traffic patterns (where deployed).
Monitoring & operations 24/7 Ongoing health and capacity monitoring to keep the service available.
Backups Scheduled Backups to support recovery where they are part of the architecture.
Security reviews Periodic Recurring reviews and, where appropriate, third-party or internal testing.
Patches & updates Ongoing We prioritize applying important security updates to our systems and dependencies.

People & access

Access policies

Training & awareness

Security training

Team members receive ongoing training on common threats and good practices, so we can reduce human error and respond early.

Incident response

We maintain a response plan to handle security events in an orderly way:

1. Detection

We use monitoring and signals to notice problems early.

2. Alerting

The right people are notified quickly so the team can act.

3. Containment

We limit the blast radius of an issue while we assess what happened.

4. Recovery

We restore service confidence and check that the issue is fully addressed.

Report a concern

If you see suspicious activity or believe there has been a security incident, contact us as soon as you can. For security issues you can use: security@itqan-tools.com

Compliance & certifications

ISO/IEC 27001

A widely used framework for an information security management system.

GDPR

We take EU data protection rules seriously and design processes with those expectations in mind.

Local & regional law

We also pay attention to local requirements that may apply to our users.

SOC 2

Many enterprises evaluate vendors using SOC 2; we can discuss security posture as needed.

Questions about security?

We are happy to answer good-faith questions about how we protect the service. Reach out by email, phone, or our contact page.

Phone

+962 6 1234 5678

Support

Contact us

Last updated: April 2026

We update this page from time to time as our security practices evolve.