This policy describes how Mismar AI - FZCO ("Company," "we," "our") protects and manages Client data within the Mismar.ai platform.
This Security & Privacy Policy applies to all Clients of Mismar.ai. It outlines our commitments regarding data protection, system security, and privacy practices.
Clients retain full ownership of all data entered into the system. The Company acts solely as a data processor, handling Client data only as instructed and in compliance with UAE Federal Decree-Law No. 45 of 2021.
Clients may access, modify, export, or delete their data at any time via admin controls
Databases can be deleted upon request
Clients are responsible for ensuring their data complies with applicable regulations
Upon termination, Clients have a 30-day grace period to export data
After 30 days, data is permanently deleted to protect Client privacy
Each Client's data is stored in a dedicated database with no sharing of data between Clients
Access control rules enforce complete isolation between databases on the same cluster
All data in transit: Protected with 256-bit SSL encryption (HTTPS)
All data at rest: Encrypted with AES-256 (production and backups)
Internal server communications: End-to-end encryption
SSL certificates: 2048-bit modulus with full SHA-2 certificate chains
Passwords protected with PBKDF2+SHA512 encryption (salted and stretched)
Company staff cannot access or retrieve Client passwords. Login credentials transmitted securely over HTTPS
Configurable rate limiting and cooldown for failed login attempts
Configurable minimum password length enforcement
Optional CAPTCHA for brute-force protection
Clients control user permissions via admin settings
Role-based access control available
Company support staff use dedicated staff credentials (not Client passwords)
Access limited to settings relevant to support issues
All staff access is logged and auditable
Staff have signed NDAs protecting Client data confidentiality
For detailed information, refer to the OWASP Top Vulnerabilities guidelines at owasp.org.
Our servers are hosted in trusted data centers (e.g., OVH, Google Cloud) meeting the following criteria:
Restricted perimeter with authorized personnel access only
Physical access control via security badges or biometric authentication
24/7 security camera monitoring
24/7 on-site security personnel
Data center providers maintain large network capacities with automatic and manual DDoS mitigation systems that detect and divert attack traffic at network edges.
Firewalls and intrusion prevention systems detect and block threats
Brute-force password attack protection
Configurable rate limiting and CAPTCHA options
The platform is built on frameworks designed to prevent common security vulnerabilities:
SQL Injection: Prevented via ORM framework that abstracts query building
XSS (Cross-Site Scripting): Automatic escaping of all rendered expressions
CSRF (Cross-Site Request Forgery): Built-in protection requiring security tokens
Remote File Inclusion: No exposed functions; custom expressions run in sandboxed environments
Insecure Direct Object Reference: Access control enforced at data layer, not UI level
URL Access Restrictions: Security does not rely on hidden URLs; all requests validated
For detailed information, refer to the OWASP Top Vulnerabilities guidelines at owasp.org.
14 full database backups maintained on Amazon S3:
Daily backups: Last 7 days
Weekly backups: Last 4 weeks
Monthly backups: Last 3 months
Backups can be stored on Client-owned online servers, either upon request or on a periodic basis. Full access to retrieve backups can be provided post-implementation whenever needed.
Each backup contains a complete database snapshot
Manual backups available upon request
Backups can be sent to Client-owned cloud or on-premise servers
Backup restoration available upon request
24/7 automated system monitoring
Immediate alerts for performance degradation
Servers continuously patched against latest SSL vulnerabilities
This policy may be updated to reflect legal, technical, or operational changes. The latest version would be available here on our website and upon request.