HEX
Server: Apache/2.4.58 (Ubuntu)
System: Linux ip-172-26-0-120 6.17.0-1009-aws #9~24.04.2-Ubuntu SMP Fri Mar 6 23:50:29 UTC 2026 x86_64
User: ubuntu (1000)
PHP: 8.3.6
Disabled: NONE
Upload Files
File: //var/www/html/orbidirectory.com/storage/framework/views/58891e5b7dd13d3635c7c41796d3131e.php
<?php $__env->startSection('content'); ?>
<br><br>
<div class="container py-5">
    <div class="text-center mb-4">
        <h1 class="display-4 font-weight-bold">Security Policy for Orbi Directory</h1>
        <p class="lead">Effective Date: [Insert Date]</p>
    </div>

    <div class="security-policy-content">
        <p class="mb-4">
            At Orbi Directory, we take the security of our users' data and our platform very seriously. This Security Policy outlines the measures we implement to protect your personal, business, and payment information from unauthorized access, alteration, disclosure, and destruction. By using our services, you agree to comply with the practices outlined in this policy.
        </p>

        <div class="policy-section">
            <h3 class="font-weight-bold">1. Data Encryption</h3>
            <p>
                We use industry-standard encryption protocols to protect sensitive data during transmission. This includes the use of SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption, which ensures that your personal and business data, including login credentials and payment details, are securely transmitted over the internet.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">2. Payment Security</h3>
            <p>
                For transactions related to paid listings, we use secure third-party payment processors. We do not store your payment information directly, but ensure that all transactions are processed securely by trusted payment gateways that comply with Payment Card Industry Data Security Standards (PCI DSS).
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">3. User Authentication</h3>
            <p>
                To protect your account from unauthorized access, we employ strong user authentication measures. These include:
            </p>
            <ul>
                <li><strong>Password Protection:</strong> We require users to create strong passwords for their accounts. Passwords must meet certain complexity requirements to ensure they are not easily guessed.</li>
                <li><strong>Two-Factor Authentication (2FA):</strong> We offer an additional layer of security by enabling two-factor authentication (2FA). When enabled, users must verify their identity through a second factor (such as a code sent to their email or phone) before accessing their accounts.</li>
            </ul>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">4. Access Control</h3>
            <p>
                We implement strict access control policies to ensure that only authorized personnel have access to sensitive data:
            </p>
            <ul>
                <li><strong>Role-Based Access:</strong> Only authorized personnel with specific roles are granted access to certain types of data, based on the principle of least privilege.</li>
                <li><strong>Employee Training:</strong> Our employees receive regular training on security practices and data protection to help minimize the risk of internal security breaches.</li>
            </ul>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">5. Monitoring and Logging</h3>
            <p>
                We continuously monitor our systems for unusual or suspicious activity. Logs of user access and system interactions are maintained to detect and respond to potential security threats. These logs are reviewed periodically to ensure compliance with our security standards.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">6. Data Backups</h3>
            <p>
                We regularly back up our data to ensure that it can be recovered in case of an unexpected event, such as a system failure, data corruption, or security breach. Our backup processes are securely stored and regularly tested to ensure they function properly.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">7. Security Updates and Patches</h3>
            <p>
                We maintain an ongoing process for applying security updates and patches to all our systems and software. This helps ensure that our platform remains protected against the latest known vulnerabilities and threats. We monitor and address security vulnerabilities as part of our regular system maintenance procedures.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">8. Data Storage and Retention</h3>
            <p>
                We store your personal and business information in secure, encrypted databases. We retain your data only for as long as necessary to fulfill the purpose for which it was collected, such as maintaining your listing and processing payments. Once your data is no longer required, we securely delete it from our systems.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">9. Third-Party Services</h3>
            <p>
                While we take all reasonable measures to protect your data, some services and tools that we use to operate our platform may be provided by third-party vendors. These third parties are contractually required to implement their own security measures to protect your data. However, we cannot be held responsible for the security practices of third-party services.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">10. Incident Response and Reporting</h3>
            <p>
                In the event of a security incident, such as a data breach, we have an incident response plan in place. We will:
            </p>
            <ul>
                <li>Investigate the incident to assess the scope and impact.</li>
                <li>Notify affected users, if necessary, and provide guidance on steps they can take to protect their information.</li>
                <li>Work with relevant authorities to resolve the issue and prevent future occurrences.</li>
            </ul>
            <p>
                If you suspect any security vulnerabilities or breaches, please contact us immediately at [Insert Contact Email].
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">11. User Responsibility</h3>
            <p>
                As a user, you are responsible for maintaining the confidentiality of your account credentials, including your username and password. We recommend that you:
            </p>
            <ul>
                <li>Use a strong and unique password for your account.</li>
                <li>Enable two-factor authentication (2FA) if available.</li>
                <li>Do not share your login details with anyone else.</li>
            </ul>
            <p>
                If you suspect any unauthorized access to your account, please contact us immediately to take the necessary actions to secure your account.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">12. Security of Children’s Data</h3>
            <p>
                Orbi Directory’s services are not intended for children under 18 years old. We do not knowingly collect or maintain personal information from minors. If we become aware that a child has provided us with personal data, we will take immediate steps to remove the data and terminate any associated accounts.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">13. Changes to This Security Policy</h3>
            <p>
                We may update this Security Policy from time to time to reflect changes in our practices, technology, or legal requirements. Any updates will be posted on this page, and the effective date will be revised accordingly. We encourage you to review this policy periodically to stay informed about how we are protecting your information.
            </p>
        </div>

        <div class="policy-section">
            <h3 class="font-weight-bold">14. Contact Us</h3>
            <p>
                If you have any questions or concerns regarding this Security Policy or the security of your data, please contact us at:
            </p>
            <p>
                Orbi Directory<br>
                <?php echo e($data['website_email']); ?> <br>
                <?php echo e($data['website_phone_number']); ?><br>
                <?php echo e($data['address']); ?>

            
            </p>
        </div>
    </div>
</div>
<?php $__env->stopSection(); ?>

<?php echo $__env->make('layouts.front.main_layout', \Illuminate\Support\Arr::except(get_defined_vars(), ['__data', '__path']))->render(); ?><?php /**PATH /var/www/html/orbidirectory.com/resources/views/front/security-policy.blade.php ENDPATH**/ ?>