Application Security

The robust application security model prevents any customer from accessing another customer’s data. This security model is reapplied with every request and enforced for the entire duration of a user session. 

Coding Standards

Our system is developed in accordance with the highest coding standards and software architecture. We use best practices with our development framework and life-cycle. Our code base undergoes functional and security reviews on a regular basis to ensure high standards of quality. 

Network Security

The entire Chinsay service including your data is protected by the latest firewall protection, intrusion detection systems, and proprietary security products across all segments of our network. We work with 3rd party service providers to continuously test the network for security breaches.

Application Access

Chinsay protects customer data by ensuring that only authorised users can access it using their unique username and password. Users are prevented from choosing weak passwords. An encrypted session ID cookie is used to uniquely identify each user. You can also choose to restrict access to a specified IP range so that access is restricted to designated physical locations or through your organisation's VPN.


All customer data is continually backed up to local disk as the first level of data protection. Encrypted backups are transmitted to our secured Disaster Recovery site on a daily basis via a private fiber link between the Microsoft Azure data centres and TelecityGroup that keeps the traffic off the Internet as an additional level of data protection. 

Disaster Recovery

Chinsay has implemented a disaster recovery plan designed to allow us to resume service delivery from a secondary data centre with minimum service disruption. The secondary data centre is managed by TelecityGroup and is ISO 27001:2005, ISO 9001:2008, ISO 14001 and PCI DSS certified ( Physical access to Chinsay servers is restricted to authorised personnel only. Our servers are protected by the latest security systems which utilises a layered approach to site security and access, with manned security all year around 24/7

Monitoring and logging

Chinsay’s service is continually monitored for security violations attempts and our team is immediately notified of any such attempts. Our service generates system logs and audit data which is reviewed to detect any security violations. We implement various 3rd party scanning technologies to monitor the service against existing and new threats.

Data encryption

All data is encrypted in transfer and all access to the service is governed by strict password security policies. All passwords are stored in hashed/salted format, which means they cannot be reversed to the original password and are not readable. The Chinsay Recap Manager (RM) and Commodity Contracts Manager (CCM) services are protected by 256-bit SSL encryption.


Our hosting solution provider, Microsoft Azure, is certified compliant with the following security and compliance standards.