Security, Privacy, and Compliance
Pingahla is committed to preserving the confidentiality, integrity, availability, and traceability of all forms of information used by Pingahla and maintained on behalf of employees, investors, business partners, customers, and government agencies.
Pingahla follows security and privacy best practices
Pingahla implements a combination of policies, procedures, and technologies to ensure that all data is adequately protected and secured.
Pingahla Data Loader is a managed cloud integration platform hosted on Amazon Web Services. It operates in multiple AWS regions globally. Any instance in any public cloud region can fail over to another region of the same public cloud vendor. Read Pingahla Data Loader Security Architecture Overview.
The status of Pingahla Data Loader, planned updates, and important information about outages is available at https://
Pingahla uses XXX to assess its security and demonstrate performance.
Pingahla maintains a business continuity plan regarding how we respond to disruptive events. The plan addresses: data backup and recovery; all mission-critical systems; financial and operational assessments and checklists; alternative communications with customers, employees, and regulators; evacuation plans; alternate physical location of employees; critical suppliers; regulatory reporting; and assuring our customers prompt access to their data if we are unable to continue our business.
Security incident response
What Pingahla calls a security incident is an event that, as assessed by the CISO, violates Pingahla policy; information security policy; other policy, standard, or code of conduct; or threatens the confidentiality, integrity, or availability of information systems or services.
Incidents may be established by review of a variety of sources, including, but not limited to, the monitoring of systems, reports from Talend staff or outside organizations (including customers or partners), and service degradations or outages. Discovered incidents will be declared and documented.
Incidents are categorized as critical, high, medium, or low importance according to their potential for exposing restricted data or the criticality of resources involved.
In the event of a security incident impacting one or more Pingahla customers, the CISO will trigger Pingahla’s Incident Response Plan and follow Pingahla’s Security Incident Process.
This process encompasses six phases: preparation, detection, containment, investigation, remediation, and recovery.
Throughout the entire process, the CISO will work closely with all impacted customers and make sure that they are provided with all necessary, available, and acceptable (by laws and regulations) artifacts that help in the investigation of the incident, its remediation, and the recovery.