MetaboliQ Technologies Pvt. Ltd. (“MetaboliQ”) takes the security of our Services and the data entrusted to us seriously. This page describes our general security posture and how to report vulnerabilities. It is not an exhaustive description of all controls.
We design for confidentiality, integrity, and availability appropriate to healthcare-adjacent and personal data. Security is integrated into product development, operations, and vendor management, and is reviewed as threats and regulations evolve.
Depending on the environment, we may employ measures such as: encryption for data in transit (e.g. TLS); encryption at rest where applicable; role-based access control; authentication and session management; logging and monitoring; secure software development practices; and infrastructure hardening aligned with cloud provider best practices.
We limit access to production systems and data on a need-to-know basis; use agreements and reviews for subprocessors; and train team members on privacy and security expectations relevant to their role.
Where the Services process health or clinical information, additional safeguards may apply under law, contracts, and clinical governance. Features such as audit trails and consent flows are designed to support compliance and patient safety.
We maintain procedures to identify, contain, and recover from security incidents, and to notify affected parties and regulators when required by applicable law.
If you believe you have found a security vulnerability in our Services, please email tushar.langer@metaboliq.in with a clear description, steps to reproduce, and impact. Do not perform testing that could harm users, degrade service, or access data that is not yours. We appreciate responsible disclosure and will work with you in good faith.
No system is perfectly secure. Users should protect credentials, keep devices updated, and follow organisational policies when using the Services.
Security inquiries: tushar.langer@metaboliq.in