Security Policy
1. Purpose
The purpose of this Information Security Policy is to protect the confidentiality, integrity, and availability of Tesari’s information assets, systems, and customer data.
2. Scope
This policy applies to:
3. Security Governance & Responsibilities
Tesari maintains an information security function responsible for:
Every user, client, employee and contractor is responsible for secure handling of data, reporting incidents, and protecting credentials.
4. Risk Management
Tesari performs regular risk assessments to identify threats, vulnerabilities, and potential business impact. Mitigation plans are documented and tracked internally.
5. Data Classification & Handling
Data is classified into:
Rules include:
6. Access Control & Identity Management
Tesari enforces:
7. Infrastructure & Platform Security
Controls include:
8. Application & AI Security
Tesari applies a secure development lifecycle with:
9. Data Protection & Privacy
9.1 Encryption
All data is encrypted in transit (TLS) and at rest.
9.2 Data Minimization & Retention
Non-essential data is minimized, and defined retention periods apply.
9.3 Search Request Logging & User-Controlled De-Linking
Tesari logs all investigation requests, outputs and related system metadata (timestamps, activity logs, query parameters) for security, auditing, abuse detection, and operational reliability.
Each logged request is temporarily associated with the user account to support:
Users maintain full control over stored investigations.
When a user deletes a report, Tesari will:
This ensures users can wipe the connection between themselves and specific investigations while preserving essential system-level telemetry.
9.4 Confidentiality
Customer investigation data is never shared with third parties except where legally required or contractually agreed.
10. Third-Party & Vendor Management
Tesari evaluates vendors for security posture, contractual protections, and access limitations. Third-party access is restricted to essential operations only.
11. Logging, Monitoring & Incident Response
TESARI AI: OSINT COPILOT
Tesari logs:
An Incident Response Plan outlines procedures for detection, escalation, remediation, and customer notification where required.
12. Business Continuity & Disaster Recovery Tesari maintains:
13. Customer Responsibilities
Customers must:
This policy is reviewed annually or upon significant changes to Tesari systems, operations, or legal requirements.
14. Policy Review
This policy is reviewed annually or upon significant changes to Tesari systems, operations, or legal requirements.
Security Policy
1. Purpose
The purpose of this Information Security Policy is to protect the confidentiality, integrity, and availability of Tesari’s information assets, systems, and customer data.
2. Scope
This policy applies to:
3. Security Governance & Responsibilities
Tesari maintains an information security function responsible for:
Every user, client, employee and contractor is responsible for secure handling of data, reporting incidents, and protecting credentials.
4. Risk Management
Tesari performs regular risk assessments to identify threats, vulnerabilities, and potential business impact. Mitigation plans are documented and tracked internally.
5. Data Classification & Handling
Data is classified into:
Rules include:
6. Access Control & Identity Management
Tesari enforces:
7. Infrastructure & Platform Security
Controls include:
8. Application & AI Security
Tesari applies a secure development lifecycle with:
9. Data Protection & Privacy
9.1 Encryption
All data is encrypted in transit (TLS) and at rest.
9.2 Data Minimization & Retention
Non-essential data is minimized, and defined retention periods apply.
9.3 Search Request Logging & User-Controlled De-Linking
Tesari logs all investigation requests, outputs and related system metadata (timestamps, activity logs, query parameters) for security, auditing, abuse detection, and operational reliability.
Each logged request is temporarily associated with the user account to support:
Users maintain full control over stored investigations.
When a user deletes a report, Tesari will:
This ensures users can wipe the connection between themselves and specific investigations while preserving essential system-level telemetry.
9.4 Confidentiality
Customer investigation data is never shared with third parties except where legally required or contractually agreed.
10. Third-Party & Vendor Management
Tesari evaluates vendors for security posture, contractual protections, and access limitations. Third-party access is restricted to essential operations only.
11. Logging, Monitoring & Incident Response
TESARI AI: OSINT COPILOT
Tesari logs:
An Incident Response Plan outlines procedures for detection, escalation, remediation, and customer notification where required.
12. Business Continuity & Disaster Recovery Tesari maintains:
13. Customer Responsibilities
Customers must:
This policy is reviewed annually or upon significant changes to Tesari systems, operations, or legal requirements.
14. Policy Review
This policy is reviewed annually or upon significant changes to Tesari systems, operations, or legal requirements.
Apply for early access
For Enterprice
Security Policy
1. Purpose
The purpose of this Information Security Policy is to protect the confidentiality, integrity, and availability of Tesari’s information assets, systems, and customer data.
2. Scope
This policy applies to:
3. Security Governance & Responsibilities
Tesari maintains an information security function responsible for:
Every user, client, employee and contractor is responsible for secure handling of data, reporting incidents, and protecting credentials.
4. Risk Management
Tesari performs regular risk assessments to identify threats, vulnerabilities, and potential business impact. Mitigation plans are documented and tracked internally.
5. Data Classification & Handling
Data is classified into:
Rules include:
6. Access Control & Identity Management
Tesari enforces:
7. Infrastructure & Platform Security
Controls include:
8. Application & AI Security
Tesari applies a secure development lifecycle with:
9. Data Protection & Privacy
9.1 Encryption
All data is encrypted in transit (TLS) and at rest.
9.2 Data Minimization & Retention
Non-essential data is minimized, and defined retention periods apply.
9.3 Search Request Logging & User-Controlled De-Linking
Tesari logs all investigation requests, outputs and related system metadata (timestamps, activity logs, query parameters) for security, auditing, abuse detection, and operational reliability.
Each logged request is temporarily associated with the user account to support:
Users maintain full control over stored investigations.
When a user deletes a report, Tesari will:
This ensures users can wipe the connection between themselves and specific investigations while preserving essential system-level telemetry.
9.4 Confidentiality
Customer investigation data is never shared with third parties except where legally required or contractually agreed.
10. Third-Party & Vendor Management
Tesari evaluates vendors for security posture, contractual protections, and access limitations. Third-party access is restricted to essential operations only.
11. Logging, Monitoring & Incident Response
TESARI AI: OSINT COPILOT
Tesari logs:
An Incident Response Plan outlines procedures for detection, escalation, remediation, and customer notification where required.
12. Business Continuity & Disaster Recovery Tesari maintains:
13. Customer Responsibilities
Customers must:
This policy is reviewed annually or upon significant changes to Tesari systems, operations, or legal requirements.
14. Policy Review
This policy is reviewed annually or upon significant changes to Tesari systems, operations, or legal requirements.
Apply for early access
For Enterprice