Security Policy

Get Access to support if you have questions regarding this document:
We support companies with deep privacy needs. Please see our privacy policy below. For customization, reselling Rantir or other commercial goals and needs for your company please reach out to hello@rantir.com or support@rantir.com.
Type:
Security Policy
Last updated 08.23.2024

We support companies to use Rantir for commercial uses and promote their own brands and products, however you don't own the software used to make these products or these websites or the AI that powers these products. For customization, reselling Rantir or other commercial goals and needs for your company please reach out to hello@rantir.com.

A Holistic Approach to Rantir's Security attributes as defined below

Rantir's provide safeguarding an organization’s assets, data, and operations through our Run Times and Backup features within RantirApp. Below, I’ve outlined five key paragraphs to guide you:

How Rantir Security Policy works:

A robust security policy serves as the foundation for an organization’s security posture lies within our automation and integration features, specifically our run-times and backups within a secure Postgres db, private and not shared to any other customer within an cloud provider (or hosting). It outlines the principles, guidelines, and responsibilities related to information security. Here are the key components to include:

  • Your Cloud instance is private: This means that no other client of Rantir can access your instance, and it is installed on a private server. The following policy and specify the systems, data, and personnel it covers.
  • Roles and Responsibilities: Identify roles (e.g., CISO, IT staff, end-users) and their responsibilities in maintaining security as Rantir's Lead Engineer, CTO and CEO of Rantir, Inc.
  • Compliance and Legal Framework: Acknowledge relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA).
  • Risk Assessment: Describe how risk assessments will be conducted and how risks will be mitigated.

Access Control and Authentication

Access control ensures that only authorized individuals can access resources. Consider the following aspects:

  • User Authentication: Specify authentication methods (e.g., passwords, multi-factor authentication) and enforce strong password policies are within an private server, not share among other clients.
  • Authorization: Define access levels (read, write, execute) based on roles.
  • Least Privilege: Implement the principle of least privilege—users should have the minimum access necessary to perform their tasks.
  • Audit Trails: Log access events and regularly review audit logs.

Data Protection and Encryption

Protecting sensitive data is paramount. Address the following:

  • Data Classification: Classify data (public, internal, confidential) and apply appropriate controls.
  • Encryption: Encrypt data at rest (disk encryption) and in transit (TLS/SSL).
  • Key Management: Safely manage encryption keys.
  • Data Loss Prevention (DLP): Implement DLP solutions to prevent data leaks.

Incident Response and Business Continuity

Prepare for security incidents and ensure business continuity in Rantir's Risk Assessment and Planning process. Rantir Business continuity ensures resilience during disruptions. We identify Risk Assessment as regularly assess potential threats, including natural disasters, cyberattacks, and supply chain disruptions. Understand their impact on critical business operations. We Identify essential processes, dependencies, and recovery time objectives (RTOs). Prioritize resources based on their criticality Then we develop a comprehensive plan that outlines how the organization will continue operating during disruptions. Include communication strategies, resource allocation, and alternative work arrangements

Backup and Redundancy Plan: Data protection and redundancy are key components of business continuity:

      • Data Backup: Regularly back up critical data. Test backups to ensure they are usable during recovery. Consider both on-site and off-site backups.
      • Redundancy: Implement redundancy for essential systems. This might involve redundant servers, failover mechanisms, or geographically distributed data centers.
    • 3. Testing and Drills: Regular testing ensures that your business continuity plans work effectively:
      • Tabletop Exercises: Conduct simulated scenarios with key stakeholders. Validate the BCP and response procedures. Identify areas for improvement.
      • Disaster Recovery (DR) Drills: Test the technical aspects of recovery, such as failover, data restoration, and system availability.

    Employee Training and Awareness

    People are often the weakest link. Invest in security awareness:

    • Training Programs: Regularly educate employees on security best practices.
    • Phishing Awareness: Teach employees to recognize phishing attempts.
    • Social Engineering: Raise awareness about social engineering tactics.
    • Reporting Incidents: Encourage employees to report security incidents promptly.

    Compliance with Legal Standards

    Rantir, Inc. complies with all applicable data protection laws and regulations, including the General Data Protection Regulation (GDPR) limited and the California Consumer Privacy Act (CCPA) limited. By adhering to these legal standards, we ensure that our data protection practices meet the highest levels of scrutiny and accountability. With our data protection policy program we adhere each platform as an ongoing process, and we are committed to continuously improving our practices. We stay abreast of the latest developments in data security and privacy to ensure that our measures remain effective and up-to-date.

    Feedback from users and stakeholders is invaluable in this process, helping us to refine our policies and enhance our services. At Rantir, Inc., we are dedicated to maintaining a secure and trustworthy platform for all our users.

    Get started with Rantir

    Modern businesses will choose an AI agent OS and integration platform, now with Voice AI. Integrate your website and internal dashboards with voice, and over 200+ integrations.

    Data & Authentication

    Create content with AI in a spreadsheet form with all of the SSO layer to make it secure.

    Visual Editor for Portals & Apps

    The foundational layer to generate websites and dashboards and edit them without code.

    220+ Integrations & Logic

    Your AI agentic layer for all things automated. Let AI take the helm.