Security Policy

Our Security Policy

At Container Miles, we prioritize the security and protection of our customers’ data, as well as our own business operations. This Security Policy outlines the measures we have in place to safeguard information, prevent unauthorized access, and maintain the integrity and confidentiality of data. By using our services, you agree to adhere to the guidelines set forth in this Security Policy.

1. Data Security:

a. Access Control: We implement role-based access controls to restrict access to sensitive data to authorized personnel only. Employees, contractors, and third-party service providers are granted access based on the principle of least privilege.

b. Password Policy: Strong and unique passwords are required for all accounts. Passwords must be regularly updated, and password reuse is strictly prohibited.

c. Multi-Factor Authentication (MFA): MFA is enforced for accessing critical systems and sensitive data to add an extra layer of security.

d. Data Encryption: Data transmitted over the internet and stored in our systems is encrypted using industry-standard encryption protocols (e.g., SSL/TLS).

e. Data Minimization: We only collect and retain the minimum amount of data necessary to conduct business and fulfill our obligations to customers.

f. Data Backup: Regular data backups are performed to ensure data integrity and availability in case of data loss or system failures.

2. Network Security:

a. Firewall Protection: We deploy firewalls to protect our internal network from unauthorized access and potential cyber threats.

b. Intrusion Detection and Prevention: We employ intrusion detection and prevention systems to monitor and identify suspicious network activities.

c. Network Segmentation: To limit the impact of potential security breaches, our network is segmented into distinct zones with varying levels of access controls.

d. Secure Wi-Fi: Our Wi-Fi networks are secured with strong encryption and access controls to prevent unauthorized access.

3. Software Security:

a. Software Updates and Patching: We regularly update and patch all software, operating systems, and applications to address known vulnerabilities.

b. Code Reviews: All software code is reviewed and tested for security vulnerabilities before deployment.

c. Application Security: We follow secure coding practices to prevent common security flaws and conduct periodic security assessments.

4. Physical Security:

a. Access Control: Physical access to our office spaces, data centers, and storage facilities is restricted to authorized personnel only.

b. Surveillance: CCTV cameras are deployed in key areas to monitor and record activities within our premises.

c. Equipment Disposal: End-of-life equipment is securely decommissioned to prevent unauthorized data access.

5. Incident Response:

a. Incident Reporting: Employees are required to report any security incidents or suspected breaches promptly.

b. Incident Response Team: We maintain an incident response team to handle security incidents effectively and efficiently.

c. Communication: In the event of a security breach, we will promptly notify affected individuals and relevant authorities as required by applicable laws and regulations.

6. Employee Training and Awareness:

a. Security Awareness Training: Employees receive regular training on security best practices, including how to identify and report potential security threats.

b. Confidentiality Agreements: Employees and contractors are required to sign confidentiality agreements to protect sensitive information.

7. Vendor Management:

a. Security Assessments: Third-party vendors and service providers are thoroughly evaluated for security practices before engagement.

b. Contractual Obligations: We include security clauses in our contracts with vendors to ensure data protection and compliance.

8. Compliance and Legal Requirements:

a. Data Protection Laws: We comply with applicable data protection laws and regulations, including the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

b. Security Audits: Regular security audits are conducted to assess our compliance with this Security Policy and relevant security standards.

9. Security Policy Updates:

We may update this Security Policy as needed to reflect changes in technology, best practices, or legal requirements. The revised policy will be posted on our website, and the “Effective Date” at the top will indicate the latest version.

If you have any security-related concerns or questions, please contact our Security Team at:

By using our services, you acknowledge that you have read and understood this Security Policy and agree to its terms.


Above $ 10,000


Payment methods.


Unlimited help desk.

100% SAFE

View our benefits.


Track or cancel orders.

Shopping cart
0 Wishlist
0 items Cart
My account