Treasure Quest Logo

Security Information

Last updated: 14 August 2025

1. Data Encryption

We use industry-standard SSL/TLS encryption to protect data transmitted between your device and our servers.

2. Secure Storage

Your personal information is stored on secure servers with appropriate physical and digital safeguards in place.

3. Access Controls

We implement strict access controls to ensure that only authorized personnel can access your personal information.

4. Regular Security Audits

We conduct regular security assessments and audits to identify and address potential vulnerabilities.

5. Incident Response

We have procedures in place to respond quickly to any security incidents and will notify affected users as required by law.

6. Account Security

We recommend that you:

  • Use a strong, unique password for your account
  • Keep your login credentials confidential
  • Log out of your account when using shared devices
  • Report any suspicious activity immediately

7. Reporting Security Issues

If you discover a security vulnerability or have concerns about our security practices, please contact us immediately at security@treasurequestau.com

8. Backups & Recovery

We maintain regular encrypted backups and test recovery procedures to ensure service continuity and data integrity.

9. Vulnerability Management

Systems are regularly patched. We monitor for CVEs and apply fixes according to severity SLAs.

10. Access Controls

Principle of least privilege, role-based access control, MFA where available, and periodic access reviews are enforced.

11. Secure Development

Code reviews, dependency scanning, and secret management practices are applied throughout the development lifecycle.

© 2025 Treasure Quest. All rights reserved.

Back to Home