This Security Policy outlines the commitment of Virtual Assistant US ("we", "us", or "our") to protect the confidentiality, integrity, and availability of information and systems used to deliver our services, including WordPress website management, Flutter app support, SEO optimization, GoHighLevel automation, and virtual assistant services.
We view data security as a core component of our service and continuously implement industry best practices to safeguard your information.
1. Data Security Measures
We employ multiple layers of protection to ensure your data remains safe:
1.1. Encryption in Transit and at Rest
- All data transmitted between your browser and our servers is secured using SSL/TLS encryption (HTTPS).
- Sensitive client data stored on our systems is encrypted as required to ensure confidentiality.
1.2. Access Control and Authentication
- Access to sensitive data is strictly limited to authorized personnel only.
- We enforce strong password policies and Multi-Factor Authentication (MFA) for administrative access.
1.3. Secure Development Practices
All development projects, including WordPress, Flutter, and custom code, follow secure coding standards and regular security testing to minimize vulnerabilities.
2. Infrastructure and Network Security
Our hosting and operations environment uses robust network protection:
- Firewalls and Intrusion Detection: We use enterprise-grade firewalls and monitoring systems to detect and prevent threats.
- Continuous Monitoring: Systems are actively monitored to identify suspicious activity promptly.
3. Data Backup and Recovery
To ensure data availability and integrity, we maintain secure backup procedures:
- Data is backed up frequently and stored securely off-site.
- We have a tested disaster recovery plan to quickly restore services if required.
4. Incident Response
In the unlikely event of a security breach:
- We follow an established Incident Response Plan to contain, mitigate, and resolve incidents.
- Clients affected by security issues will be notified promptly according to applicable regulations, including GDPR where relevant.
5. Your Role in Security
We ask clients to support security efforts by following best practices:
- Use strong and unique passwords for your accounts.
- Keep login credentials confidential and notify us immediately if unauthorized access is suspected.
6. Contact Us for Security Concerns
If you identify a security vulnerability or have questions about our security practices, contact our security team immediately:
This policy may be updated as technology and best practices evolve. We commit to keeping this page up-to-date with any changes to our security procedures.