Security
Last Updated: November 30, 2025
Our Security Commitment
At Akeelah, we understand that your trust is paramount. We are committed to protecting the security and privacy of your data through industry-leading security practices and continuous monitoring.
Data Encryption
All data transmitted between your device and our servers is encrypted using TLS 1.2 or higher. Sensitive information such as passwords, payment details, and personal identifiers are encrypted both in transit and at rest using AES-256 encryption. This is the same level of encryption used by major financial institutions.
Password Security
Passwords are never stored in plain text. We use bcrypt with a cost factor of 12 to hash passwords, making them virtually impossible to reverse-engineer. We recommend using strong, unique passwords and enabling two-factor authentication if available.
Server Security
Our servers are hosted on secure, redundant infrastructure with 24/7 monitoring. We implement:
- Firewalls and intrusion detection systems
- Regular security patches and updates
- Network segmentation and access controls
- DDoS protection and rate limiting
- Comprehensive logging and audit trails
Application Security
Our application undergoes regular security testing including:
- Penetration testing by third-party security experts
- Static and dynamic code analysis
- Dependency scanning for known vulnerabilities
- Regular security audits and compliance checks
- Automated security testing in our CI/CD pipeline
Access Controls
We implement strict access controls to ensure that:
- Only authorized personnel can access production systems
- All access is logged and monitored
- Multi-factor authentication is required for administrative access
- Users can only access their own account data
- Parents have complete control over their child's information
Compliance and Certifications
Akeelah complies with:
- COPPA (Children's Online Privacy Protection Act): We comply with all requirements for protecting children's privacy
- GDPR: We comply with GDPR requirements for EU users
- CCPA: We comply with California Consumer Privacy Act requirements
- Data Protection Laws: We comply with all applicable data protection regulations in Ghana and internationally
Incident Response
In the unlikely event of a security breach, we have a comprehensive incident response plan:
- Immediate investigation and containment
- Notification to affected users and authorities if required
- Transparent communication about the incident
- Remediation and prevention of future occurrences
Third-Party Security
All third-party vendors and service providers are required to:
- Sign data processing agreements
- Maintain equivalent security standards
- Undergo regular security audits
- Report any security incidents immediately
User Responsibilities
While we take comprehensive security measures, you also play a role in keeping your account secure:
- Use a strong, unique password
- Never share your login credentials with others
- Keep your device software up to date
- Be cautious of phishing attempts
- Report suspicious activity immediately
Vulnerability Disclosure
If you discover a security vulnerability, please email us at info@akeelah.com instead of disclosing it publicly. We appreciate responsible disclosure and will work with you to resolve the issue promptly.
Contact Us
For security concerns or questions, please contact us at:
Email: info@akeelah.com
Address: Synortech Solutions Limited, Ghana