Trust Centre
Dhruva Space places a high value on the security and privacy of your information. We are dedicated to safeguarding your data and ensuring the security of the digital environment.
Our Approach to Data Security
- We implement state of the art security technologies, such as, SEIM, IDS/IPS, encryption, and firewalls, to protect your data.
- Employee Training: Our employees receive consistent cybersecurity and cyber hygiene training.
- Data Privacy: We ensure that your personal data is handled with the utmost care, in accordance with pertinent data protection regulations, including the General Data Protection Regulation (GDPR) and the Digital Personal Data Protection Act (DPDPA).
- Incident Response: We have implemented a comprehensive incident response strategy to promptly address potential security breaches.
- Data Sharing: We essentially on requirement basis share your data with reputable third-party service providers who comply with rigorous security protocols.
- Third-Party Relationships: We perform exhaustive due diligence on our third-party associates to guarantee that they satisfy our security standards.
Your Rights
- We hold your privacy and liberties in the highest regard. You are entitled to access, rectify, or delete your personal data. To exercise these rights, kindly reach out to our Data Protection Officer at dpo@dhruvaspace.com.
Accountability and Transparency:
- We are committed to accountability and transparency. Our trust centre furnishes you with details regarding our data protection procedures. Please do not hesitate to reach out to us if you have any queries or concerns.
Security FAQs
The security of your data is our top priority at Dhruva Space. The security measures we implement are highly effective, and they include:
- Data Encryption: Industry-standard encryption protocols are employed to encrypt sensitive data during both transit and storage.
- Firewall Security: To prevent unauthorised access, our network is protected by intelligent firewalls.
- Intrusion Detection and Prevention Systems: These systems are employed to monitor network traffic for suspicious activity and to block potential threats.
- Security Audits: Our systems and processes are subjected to routine security assessments to identify and resolve vulnerabilities.
- Training for Employees: Our employees are provided with continuous instruction regarding data security best practices.
- We strictly comply with data protection regulations such as GDPR and DPDPA to guarantee that your data is handled with the utmost care.
To safeguard your privacy and adhere to pertinent regulations, we have implemented a transparent data retention policy. We only retain customer data for the duration necessary to fulfil the purpose for which it was collected or as mandated by law. We securely delete or anonymize the data once it is no longer required. To guarantee conformance and minimize data, our data retention periods are consistently reviewed and revised.
We have implemented an integrated incident response strategy to mitigate the risk of data breaches. Our response comprises the following:
- Preparation: Establish policies, train personnel, and deploy monitoring tools to detect potential threats.
- Detection & Analysis: Identify security incidents using logs, alerts, and threat intelligence. Assess the severity and impact.
- Containment: Isolate affected systems to prevent further damage and limit the spread of the incident.
- Eradication: Remove the root cause of the incident (e.g., malware, compromised accounts).
- Recovery: Restore systems, verify integrity, and monitor for further issues.
- Lessons Learned: Conduct a post-incident review to improve security measures and refine response strategies.
- Transparency: We maintain an open and candid dialogue with our customers regarding the incident. We are dedicated to minimising the impact of any potential breach and prioritise the protection of our customers' data.
Yes, we are dedicated to safeguarding personal data and complying with international data privacy regulations. Our data management practices are consistent with the principles of DPDPA/GDPR, as well as other pertinent regulations in the jurisdictions in which we operate. To guarantee continuous conformance, we conduct routine reviews and updates of our policies.
To safeguard data transmitted via satellite, we implement stringent security protocols:
- End-to-End Encryption: We implement highly secure encryption protocols to protect data during transmission.
- Secure Ground Stations: Our ground stations are fortified with state-of-the-art security measures to prevent unauthorised access and interference.
- Regular Security Audits: Our satellite and ground infrastructure undergoes routine security evaluations.
- Standards Compliance: We comply with pertinent security standards and industry best practices.
- Redundancy and Failover: To mitigate disruptions, we implement redundant systems and fallback plans.
- By integrating these measures, we establish a secure environment for data transmission.
Our satellite systems are safeguarded by an integrated security framework:
- Physical Security: Our satellite manufacturing and delivery operations are protected by authorised physical access controls and management.
- Cybersecurity: To safeguard satellite systems from cyber threats, we enforce precise cybersecurity protocols.
- Data Encryption: The use of robust encryption standards ensures that sensitive data is encrypted during transmission to and from satellites.
- Consistent Monitoring: Our systems are subject to ongoing monitoring to identify potential vulnerabilities and anomalies.
- Emergency Procedures: Our system of responding to security incidents is well-defined.
- We guarantee the confidentiality and integrity of our satellite operations by integrating these measures.
To identify and mitigate potential vulnerabilities, we implement an extensive security audit program. Our audit procedure encompasses the following:
- A regular examination of our systems and networks for weaknesses is conducted as part of our vulnerability assessments.
- Penetration Testing: The identification of exploitable vulnerabilities through simulated campaigns.
- Third-Party Audits: External evaluations conducted by independent security experts.
- Compliance Audits: Guaranteeing compliance with industry standards and regulations.
- Continuous Monitoring: The ongoing monitoring of our systems and networks for any indications of suspicious activity.
- To improve our overall security posture, audit findings are analysed, prioritised, and addressed through corrective actions.
We prioritise the security of data shared with third-party vendors by implementing stringent verification and monitoring procedures:
- Vendor Assessment: To assess the data management practices of all third-party vendors, we conduct comprehensive security assessments.
- Contractual Obligations: We mandate that our vendors execute data processing agreements that delineate their security obligations.
- Data Minimisation: We adhere to data minimisation principles and only disclose the data that is necessary to third parties.
- Ongoing Oversight: We ensure that our vendor relationships and their security performance are consistently monitored.
- Incident Response: We have established explicit protocols for managing security incidents that involve third parties.
- By implementing these measures, we safeguard customer information and reduce the risks associated with data sharing.

Request for Information
Begumpet, Hyderabad - 500016, Telangana, India
GST: 36AAECD4647F1ZP
