Revasi Security Policy

Effective Date: April 20

2025 Last Updated: April 20, 2025

This Security Policy outlines the security measures and practices implemented by Digics, a sole proprietorship (eenmanszaak) registered in the Netherlands with the Dutch Chamber of Commerce (KVK), to protect your data when using the Revasi reservation management system ("Software").

At Revasi, we are committed to maintaining the security and confidentiality of our customers' data. This policy describes our security practices and the measures we take to protect your information.

1. Infrastructure Security

Our infrastructure is hosted on industry-leading cloud providers that maintain robust physical and environmental security controls. These providers implement state-of-the-art security measures to protect their facilities, including:

  • 24/7 physical security with surveillance systems
  • Access control mechanisms requiring multiple authentication factors
  • Fire detection and suppression systems
  • Redundant power supply systems
  • Environmental controls for temperature and humidity
  • Regular security audits and compliance certifications

2. Network Security

We implement multiple layers of network security to protect our systems and your data, including:

  • Advanced firewalls and intrusion detection systems
  • Regular network vulnerability scanning
  • DDoS (Distributed Denial of Service) protection
  • Regular security patching and updates
  • Network traffic monitoring and logging
  • Virtual private network (VPN) for secure remote access

3. Data Security

Protecting your data is our highest priority. We implement the following data security measures:

  • Encryption of data in transit using TLS 1.2 or higher
  • Encryption of sensitive data at rest using AES-256
  • Database access controls and authentication
  • Regular data backups with secure storage
  • Strict data retention policies
  • Secure data deletion processes when requested

4. Application Security

Our Software is designed with security in mind at every stage of development. Our application security measures include:

  • Secure coding practices following OWASP guidelines
  • Regular security code reviews
  • Automated and manual security testing
  • Protection against common web vulnerabilities (XSS, CSRF, SQL injection, etc.)
  • Regular third-party security audits and penetration testing
  • Software development life cycle (SDLC) with security gates

5. Authentication and Access Control

We implement strict authentication and access control measures, including:

  • Strong password policies (minimum length, complexity requirements)
  • Multi-factor authentication (MFA) support
  • Role-based access control (RBAC)
  • Session timeout and automatic logout features
  • Account lockout after failed login attempts
  • Regular access reviews and privileged account management

6. Security Incident Response

Despite our best efforts, security incidents may still occur. Our incident response plan includes:

  • Defined incident response procedures
  • Dedicated incident response team
  • Regular incident response training and simulations
  • Continuous monitoring and alerting systems
  • Timely notification to affected customers
  • Post-incident analysis and improvement processes

In the event of a security breach that affects your data, we will notify you promptly in accordance with applicable laws and regulations, including the General Data Protection Regulation (GDPR).

7. Employee Security

Our security measures extend to our employees and contractors:

  • Background checks for all employees
  • Security awareness training and education
  • Confidentiality agreements
  • Least privilege access principles
  • Regular security policy reviews and updates
  • Secure device management and endpoint protection

8. Compliance

We are committed to maintaining compliance with relevant industry standards and regulations:

  • General Data Protection Regulation (GDPR)
  • ISO 27001 principles (Information Security Management)
  • PCI DSS (Payment Card Industry Data Security Standard) for payment processing
  • Regular compliance assessments and audits
  • Documentation of security policies and procedures

9. Vendor Management

We carefully select and monitor our vendors and service providers to ensure they meet our security standards. Our vendor management process includes security assessments, contractual security requirements, and regular review of vendor security practices.

10. Customer Responsibilities

While we implement robust security measures, security is a shared responsibility. We recommend that our customers:

  • Use strong, unique passwords for your Revasi account
  • Enable multi-factor authentication when available
  • Keep your access credentials confidential
  • Ensure your devices have up-to-date security patches and antivirus protection
  • Promptly report any suspected security incidents or unauthorized access
  • Manage user access appropriately within your organization

11. Security Updates

We continuously improve our security measures and may update this Security Policy from time to time. When we make significant changes, we will notify our customers and update the "Last Updated" date at the top of this policy.

12. Contact Us

If you have any questions about our security practices or want to report a security concern, please contact us at:

Email: security@revasi.net
Website: https://www.revasi.net
Address: [Your Business Address in the Netherlands]

Learn More