Information Security Policy
Last updated: January 2026
This Information Security Policy outlines how Crowd Challenge protects all user data, system resources, digital assets, and confidential information. Our goal is to ensure confidentiality, integrity, and availability of all information stored or processed within the platform.
1. Purpose
This policy is to:
- Protect user information from unauthorized access
- Ensure secure handling of data and transactions
- Maintain trust and transparency with users
- Prevent data loss, misuse or corruption
- Establish a standard for internal security practices
2. Scope
This policy applies to:
- All users of Crowd Challenge app
- All employees, contractors and developers associated with the platform
- All data stored on servers, cloud services, and internal systems
- All third-party services integrated with the app
3. Core Security Principles
Crowd Challenge follows these security principles:
3.1 Confidentiality
Only authorized persons can access confidential or sensitive data.
3.2 Integrity
Data must remain accurate, unaltered, and protected from unauthorized modification.
3.3 Availability
Services and data must be available to users whenever needed, without unnecessary interruptions.
4. Data Protection Measures
We apply multiple layers of security to protect all information.
4.1 Encryption
- Data in transit is protected with HTTPS/SSL encryption
- Sensitive data is stored in encrypted form
4.2 Access Control
- Role-based access management
- Multi-factor authentication for administrative accounts
- Limited access for developers and staff
4.3 Server & Infrastructure Security
- Regular security updates and patches
- Firewall and intrusion detection systems
- Secure cloud infrastructure with backup solutions
4.4 Monitoring & Auditing
- Continuous activity monitoring
- Log analysis for suspicious behavior
- Monthly security audits
5. User Responsibilities
To maintain security, users must:
- Use strong passwords
- Keep login details confidential
- Report suspicious activity immediately
- Avoid sharing account access with others
6. Developer & Staff Responsibilities
All internal team members must:
- Follow secure coding practices
- Use verified and secure third-party tools
- Participate in regular security training
- Maintain confidentiality of all user and system data
7. Incident Response
If a security incident occurs:
- Incident is detected and logged
- Threat is analyzed and contained
- Affected systems are secured and restored
- Users will be notified if their data is impacted
- A full investigation and corrective action will follow
8. Data Backup & Recovery
We perform:
- Regular automatic backups
- Encrypted backup storage
- Disaster recovery procedures to ensure service continuity
9. Third-Party Security
All third-party services (payment gateways, cloud providers, ad networks) must meet security standards including:
- Compliance with international security practices
- Secure data handling policies
- Encrypted communication
We do not partner with services that lack proper security certifications.
10. Policy Review & Updates
This policy may be updated:
- Annually
- When new security threats arise
- When system upgrades require changes
Users will be notified in-app if major changes occur.
Crowd Challenge is committed to maintaining the highest level of security for our users and protecting all information with care.
11. Contact Information
For questions or concerns about information security: