Security and Data Protection
Last Updated: May 08, 2026

Introduction

Tendaly is committed to maintaining a secure, resilient, and privacy-focused infrastructure designed to protect user information, procurement data, uploaded documents, and operational activity against unauthorized access, misuse, disclosure, alteration, or destruction.

We implement a combination of technical, administrative, and organizational security controls intended to align with modern cloud security and data protection practices.

1. Infrastructure and Platform Security

Tendaly utilizes secure cloud-based infrastructure, encrypted communications, authenticated access controls, monitored environments, and layered security mechanisms designed to reduce exposure to unauthorized access and malicious activity.

Security measures may include SSL/TLS encrypted connections, encrypted data transmission, secured authentication systems, role-based access controls, session protection mechanisms, activity monitoring systems, infrastructure-level security protections, access restriction policies, secure database architecture, audit logging systems, automated backup procedures, and disaster recovery safeguards.

Access to internal systems and operational infrastructure is restricted to authorized personnel with legitimate operational responsibilities.

2. Password Security and Authentication

User passwords are not stored in plain text and are protected using industry-standard cryptographic hashing and authentication mechanisms.

Because authentication credentials are encrypted and securely managed, Tendaly personnel, developers, administrators, and support teams do not have direct visibility into user passwords and cannot manually access user accounts using customer credentials.

In situations where a user forgets their password, account access can only be restored through the established password reset and authentication verification procedures associated with the user’s authorized email address or authentication method.

Tendaly does not bypass authentication safeguards or manually retrieve customer passwords.

3. Data Access Restrictions

Tendaly is designed with access limitation principles intended to minimize unnecessary exposure to sensitive business and procurement information.

System access permissions are restricted based on operational necessity, user authorization levels, and platform responsibilities.

Internal access to production systems, procurement data, uploaded documentation, and customer-related operational information is controlled through authentication safeguards, permission segmentation, monitoring systems, and administrative access controls.

4. Monitoring and Threat Prevention

To maintain platform integrity and operational reliability, Tendaly may utilize monitoring systems, logging systems, anomaly detection mechanisms, and security review processes intended to identify unauthorized access attempts, suspicious platform behavior, abnormal system activity, operational vulnerabilities, service misuse, fraud attempts, and infrastructure-related security risks.

These measures help support platform stability, operational continuity, and ongoing security improvements.

5. Data Encryption and Transmission Protection

Information transmitted between users and Tendaly systems may be protected using encrypted communication protocols designed to reduce interception risks during transmission.

Where applicable, stored information and operational records may also be protected through infrastructure-level encryption and secured storage controls.

6. Third-Party Infrastructure and Service Providers

Tendaly may rely on reputable third-party infrastructure providers, cloud service providers, authentication systems, analytics providers, communication systems, and related operational technologies that maintain their own security and compliance standards.

While Tendaly carefully selects operational providers and applies reasonable security oversight measures, third-party infrastructure environments remain subject to their own operational policies, availability conditions, and security practices.

7. Security Limitations

Although Tendaly implements commercially reasonable safeguards and security-focused operational practices, no digital platform, infrastructure environment, network, transmission method, or software system can be guaranteed to be completely immune from vulnerabilities, cyber threats, unauthorized activity, or security incidents.

Accordingly, Tendaly does not guarantee absolute security, uninterrupted availability, or complete prevention of all possible threats, breaches, or technical vulnerabilities.

Users are responsible for maintaining the confidentiality of their login credentials, protecting access to their authorized devices and email accounts, and following reasonable account security practices.

8. Responsible Security Operations

Tendaly continuously evaluates platform reliability, operational safeguards, infrastructure stability, and evolving security practices in an effort to strengthen the protection of customer information and procurement-related data over time.