← Back to MetaboliQ

Security

Last updated: 12 April 2026 · MetaboliQ Technologies Pvt. Ltd.

MetaboliQ Technologies Pvt. Ltd. (“MetaboliQ”) takes the security of our Services and the data entrusted to us seriously. This page describes our general security posture and how to report vulnerabilities. It is not an exhaustive description of all controls.

1. Our approach

We design for confidentiality, integrity, and availability appropriate to healthcare-adjacent and personal data. Security is integrated into product development, operations, and vendor management, and is reviewed as threats and regulations evolve.

2. Technical controls

Depending on the environment, we may employ measures such as: encryption for data in transit (e.g. TLS); encryption at rest where applicable; role-based access control; authentication and session management; logging and monitoring; secure software development practices; and infrastructure hardening aligned with cloud provider best practices.

3. Organisational controls

We limit access to production systems and data on a need-to-know basis; use agreements and reviews for subprocessors; and train team members on privacy and security expectations relevant to their role.

4. Clinical and health data

Where the Services process health or clinical information, additional safeguards may apply under law, contracts, and clinical governance. Features such as audit trails and consent flows are designed to support compliance and patient safety.

5. Incident response

We maintain procedures to identify, contain, and recover from security incidents, and to notify affected parties and regulators when required by applicable law.

6. Reporting a vulnerability

If you believe you have found a security vulnerability in our Services, please email tushar.langer@metaboliq.in with a clear description, steps to reproduce, and impact. Do not perform testing that could harm users, degrade service, or access data that is not yours. We appreciate responsible disclosure and will work with you in good faith.

7. No guarantee

No system is perfectly secure. Users should protect credentials, keep devices updated, and follow organisational policies when using the Services.

8. Contact

Security inquiries: tushar.langer@metaboliq.in