Data Governance and Classification
To ensure absolute clarity under POPIA, Vizabiliti strictly distinguishes between the two categories of data we process. Each is governed by specific protocols codified in our Master Service Agreement (MSA).
Deceased Estate information, reminders and management data uploaded by you. You are the Responsible Party here!
We process this strictly on your behalf. We claim no ownership and access it only for technical support.
Your firm’s administrative details, user lists and billing information.
We protect your business confidentiality. Your client lists and volume metrics are never mined or sold.
The Relationship
We protect your data so you can protect your practice
Failure to secure this data can result in fines and reputational damage.
We handle the encryption, access control and backups so you satisfy Section 19 automatically.
Operator Mechanisms
Tier 2 : Subscriber Business Confidentiality
Policy 1: Commercial Confidentiality (No Data Mining)
We guarantee that your firm’s metadata (client lists, estate volumes, performance stats) is treated as Proprietary Business Information. It is strictly ring-fenced for billing purposes and is never mined for marketing or shared with third-party financial entities.
Policy 2: Zero-Standing Access (“The Ghost Rule”)
Our engineering staff have “no standing access” to your live environment. Access to Operational Data for technical support is:
* Consent-Based: Initiated only upon your specific support ticket request.
* Time-Bound: Uses temporary tokens that expire automatically.
* Audited: Every internal access event is logged in your immutable Audit Trail.
Technical Specifications
- Hosting: South Africa (Johannesburg) – Low latency and data sovereignty. (Domains.co.za, Teraco)
- Encryption: AES-256 SSL encryption in transit + Encryption at rest.
- Disaster Recovery: Encrypted, geo-redundant backups stored via Backblaze (USA) with South African key management.
- High-Entropy Authentication: Mandatory 16-character complex password policy (exceeding standard dictionary attacks).
- Subscriber-Controlled 2FA: Optional Multi-Factor Authentication, configurable by the Subscriber Admin based on internal risk assessment.
- Session Security: Aggressive auto-logout for idle workstations to protect office environments.
