Privacy Policy
Last updated: January 10, 2026
Introduction
At Nineteen58, we are unwavering in our commitment to upholding the highest standards of security and privacy. In an era where digital interactions are integral to daily operations, safeguarding the confidentiality, integrity, and availability of data is paramount. This policy delineates the comprehensive measures we have instituted to protect both our internal operations and the data entrusted to us by our users and partners. By integrating robust security protocols with stringent privacy practices, we aim to foster a secure and trustworthy environment that not only complies with regulatory mandates but also aligns with our ethical standards. This document serves as a testament to our dedication to data protection and provides clarity on how we manage and secure information across all facets of our organisation.
Purpose and Scope
The primary objective of this policy is to establish a clear framework for protecting sensitive information, ensuring compliance with pertinent legal and regulatory requirements, and mitigating potential security risks. This policy encompasses all employees, contractors, and third-party vendors who interact with company and customer data. It extends to all systems involved in the processing, storage, and transmission of data, reinforcing that security is a foundational principle embedded in every aspect of our operations.
By setting forth explicit security guidelines, we aim to cultivate resilience against cyber threats, reduce the likelihood of unauthorised access, and ensure the continuity of our services. This policy is applicable across all business functions, embedding security and privacy considerations into every component of our technology infrastructure, business processes, and external partnerships. Through this comprehensive approach, we endeavour to uphold the trust placed in us by our stakeholders and maintain the integrity of our operations.
Security Principles and Best Practices
Security is an evolving discipline that necessitates continuous vigilance and adaptation. At Nineteen58, our security principles are anchored in established best practices that emphasise proactive risk management and resilience.
We adhere to the principle of least privilege, ensuring that users are granted only the minimal level of access necessary to perform their roles. This approach reduces the attack surface and limits potential vulnerabilities in the event of compromised credentials. Access rights are regularly reviewed and adjusted to align with role-based requirements, preventing the accumulation of unnecessary privileges over time.
Operating under a Zero Trust framework, we continuously verify access requests rather than granting implicit trust based on network location or credentials alone. This model mandates authentication and authorisation at every stage, ensuring that security is upheld even within traditionally trusted network environments. By treating every access attempt as potentially hostile, we bolster our defences against sophisticated threat actors.
Our defence-in-depth strategy involves implementing multiple layers of security controls across our infrastructure. This includes network firewalls, intrusion detection and prevention systems, endpoint protection, and automated monitoring tools. Regular security assessments, vulnerability scans, and timely system updates are conducted to ensure that our infrastructure remains resilient against emerging threats. By layering these defences, we create redundancies that enhance our overall security posture.
Data Privacy and Protection
In today’s data-centric landscape, privacy is not merely a regulatory obligation but a fundamental right of individuals. Nineteen58 prioritises the protection of personal and business data by adhering to globally recognised data protection laws, including the General Data Protection Regulation (GDPR) and the Protection of Personal Information Act (POPIA). Our data privacy measures are meticulously designed to provide transparency, control and security over how user information is collected, processed and stored.
Users are required to provide explicit consent before their data is processed, ensuring that individuals retain control over their personal information. We are committed to maintaining robust privacy protections for our users, as outlined in our Privacy Policy. To prevent unnecessary data retention, we enforce strict policies for the secure deletion of unused data within predefined timeframes. Sensitive information is anonymised or pseudonymised where appropriate, reducing the risk of data misuse while maintaining operational efficiency. These measures not only protect our users but also reinforce trust in our ability to manage data ethically and securely.
We also recognise the importance of protecting the privacy of children. Our services are not directed to individuals under the age of 13, and we do not knowingly collect or solicit information from anyone under this age threshold. In the event that we become aware of having inadvertently gathered personal information from a child under 13 without parental consent, we will promptly delete such information to uphold our commitment to privacy and compliance.
Authentication and Access Control
Maintaining robust authentication and access control measures is critical to securing our systems and preventing unauthorised access. We enforce stringent authentication protocols that include multi-factor authentication (MFA) to enhance security beyond traditional username-password combinations. MFA requires users to provide multiple forms of verification, thereby significantly reducing the risk of account compromise due to stolen or weak credentials.
Role-Based Access Control (RBAC) is utilised to manage user permissions effectively, ensuring that access is granted only to those with explicit business requirements. By aligning access rights with specific job functions, we minimise the potential for internal threats and ensure that users can access only the information necessary for their roles. Regular audits of access permissions are conducted to adjust rights as roles evolve or personnel changes occur.
Additionally, secure API authentication methods are in place to validate all requests and prevent unauthorised integrations. By implementing strong encryption standards and regularly reviewing access logs, we ensure that all access events are monitored and can be swiftly investigated in the event of anomalies. Our approach to authentication and access control aligns with industry best practices, ensuring the security of both internal systems and customer data.
Third-Party Services and Integrations
As part of our commitment to maintaining a secure ecosystem, we extend our security measures to all third-party services and integrations. We ensure that external services adhere to strict security and compliance requirements before being integrated into our systems.
To minimise exposure to external threats, third-party access is governed by a rigorous security framework that includes scope-based permissions and API key restrictions. Access to critical systems is only granted to verified partners, and all third-party activities are monitored to detect and prevent potential security breaches. Additionally, security audits are conducted on third-party vendors to ensure alignment with our internal security policies and best practices.
Incident Response and Security Breach Handling
Despite our best efforts, security incidents remain an unfortunate reality of the digital world. In the event of a breach, Nineteen58 follows a structured incident response plan designed to contain the impact, mitigate further risks, and restore services in the shortest time possible. Security incidents must be reported within 24 hours of detection, allowing for a swift assessment and coordinated response.
Where required by regulatory obligations, affected parties and regulatory bodies are notified within the stipulated timeframes, including the 72-hour notification requirement under GDPR. Investigations are conducted to identify the root cause of the incident, after which corrective actions are implemented to strengthen security controls and prevent recurrence. Regular incident response drills ensure that our teams are well-prepared to handle security breaches efficiently and effectively.
Policy Review and Compliance
To maintain the efficacy of our security measures, we conduct regular security assessments, including penetration testing carried out by independent security experts. Our policies are reviewed on an annual basis to reflect evolving threats and best practices, ensuring that our security framework remains robust and resilient.
Compliance audits are conducted to verify adherence to industry standards, with documentation meticulously maintained to support regulatory reporting. Through these measures, we reaffirm our commitment to upholding the highest security and privacy standards.
Conclusion
At Nineteen58, security and privacy are core tenets of our operational philosophy. By implementing stringent security controls, adhering to globally recognised data protection standards, and continuously evolving our security measures, we ensure that our users and partners can trust us with their data. As threats continue to evolve, so too will our security strategies, reinforcing our unwavering commitment to safeguarding information and maintaining trust in our services.