Security Policy
Last updated: June 2025
At I Am Systems, we take your data security seriously. We've designed our systems to ensure your financial information remains protected every step of the way — from upload to processing.
256-bit SSL/TLS Encryption
The same standard used by banks and secure online services
Security Notice: We do not support or allow unencrypted data transfers.
Secure Upload Process
All files are encrypted during transmission
Bank-Level Security
Enterprise-grade encryption standards
Temporary Processing
Files processed securely and temporarilyAuto-Deletion
Files automatically deleted after processing
AI Training Policy: We do not use uploaded data to train AI models.
RECON EM Email Processing
Files sent via email are processed securely, and responses are sent back directly to the requester's email.Secure Cloud Infrastructure
Enterprise-grade cloud hostingAccess Controls
Role-based permissionsRegular Updates
Monitored and patched systems
Authorized Personnel Only
Limited access to servers and services
Continuous Monitoring
24/7 system monitoring and threat detection
Best Practices: We encourage strong passwords and multi-factor authentication (MFA) where applicable.
Strong Passwords
Complex password requirementsMulti-Factor Authentication
Additional security layer
Password Security: We do not store plaintext passwords. Authentication credentials are hashed using secure industry standards.
Important Notice: Email is inherently less secure than encrypted web apps. While we process and return recon files securely, users are responsible for ensuring they send files from trusted email accounts.
Security Recommendations:
- Use trusted email accounts for file transmission
- Avoid sensitive personal data (ID numbers, full account details)
- Consider encrypting or redacting sensitive information
Immediate Notification
Users notified as required by lawImmediate Containment
Quick response to contain issues
Audit Trail: We maintain detailed internal logs to trace and investigate incidents quickly.
Continuous Improvement: Security is not a one-time task. We conduct periodic reviews and audits to improve our safeguards.
Report Security Issues
We welcome reports of vulnerabilities or risks from our community
jessica@iamsystems.co.zaYour Security is Our Priority
We've implemented multiple layers of security to protect your data at every step.