Icon

Security & Compliance

Security & Compliance

This page outlines how dKilo approaches security, risk management, and compliance across all services.

Icon

Security & Compliance

Security & Compliance

This page outlines how dKilo approaches security, risk management, and compliance across all services.

Icon

Security & Compliance

Security & Compliance

This page outlines how dKilo approaches security, risk management, and compliance across all services.

Icon

Last Updated on January, 01,2026

1. Our Security Commitment

1. Our Security Commitment

Security is foundational to everything we build.


dKilo designs systems to protect data confidentiality, integrity, and availability across platforms, AI systems, and applications.

2. Security Measures

We apply technical and organizational safeguards including:

  • Secure cloud infrastructure

  • Role-based access controls

  • Encryption in transit and at rest (where applicable)

  • Continuous monitoring and logging

  • Restricted internal access

3. AI & System Security

AI systems are designed with:

  • Isolated execution environments

  • Controlled and permissioned data access

  • Defined operational boundaries

AI agents operate only within approved scopes.

4. Compliance Framework

We align with applicable laws and best practices, including:

  • Regional data protection regulations across MENA

  • Global privacy principles (GDPR-aligned where applicable)

  • Industry standards for SaaS and AI systems

5. Incident Response

We maintain structured incident response procedures to:

  • Assess potential threats

  • Contain impact

  • Mitigate risks

Notifications will be issued where legally required.

6. Responsible Platform Use

Users must not:

  • Attempt to compromise security

  • Abuse systems or data

  • Use services unlawfully

Violations may result in restricted or terminated access.

7. Policy Updates

This page may be updated as security practices and regulations evolve.