Security Policy

Last updated: June 2025

At I Am Systems, we take your data security seriously. We've designed our systems to ensure your financial information remains protected every step of the way — from upload to processing.

256-bit SSL/TLS Encryption

The same standard used by banks and secure online services

Security Notice: We do not support or allow unencrypted data transfers.
Secure Upload Process All files are encrypted during transmission
Bank-Level Security Enterprise-grade encryption standards

Temporary Processing
Files processed securely and temporarily
Auto-Deletion
Files automatically deleted after processing
AI Training Policy: We do not use uploaded data to train AI models.
RECON EM Email Processing
Files sent via email are processed securely, and responses are sent back directly to the requester's email.

Secure Cloud Infrastructure
Enterprise-grade cloud hosting
Access Controls
Role-based permissions
Regular Updates
Monitored and patched systems
Authorized Personnel Only Limited access to servers and services
Continuous Monitoring 24/7 system monitoring and threat detection

Best Practices: We encourage strong passwords and multi-factor authentication (MFA) where applicable.
Strong Passwords
Complex password requirements
Multi-Factor Authentication
Additional security layer
Password Security: We do not store plaintext passwords. Authentication credentials are hashed using secure industry standards.

Important Notice: Email is inherently less secure than encrypted web apps. While we process and return recon files securely, users are responsible for ensuring they send files from trusted email accounts.
Security Recommendations:
  • Use trusted email accounts for file transmission
  • Avoid sensitive personal data (ID numbers, full account details)
  • Consider encrypting or redacting sensitive information

Immediate Notification
Users notified as required by law
Immediate Containment
Quick response to contain issues
Audit Trail: We maintain detailed internal logs to trace and investigate incidents quickly.

Continuous Improvement: Security is not a one-time task. We conduct periodic reviews and audits to improve our safeguards.
Report Security Issues

We welcome reports of vulnerabilities or risks from our community

jessica@iamsystems.co.za

Your Security is Our Priority

We've implemented multiple layers of security to protect your data at every step.