Bhumi
ApproachLearnToolsFAQ
← Back to Legal

Security

Last Updated: January 10, 2026

Our Commitment to Security

At Bhumi, we understand that you trust us with sensitive financial information. Protecting that information is fundamental to our business. We implement industry-standard security measures to safeguard your data throughout its lifecycle.

Data Protection Measures

Encryption

  • In Transit: All data transmitted between your browser and our servers is encrypted using TLS 1.2 or higher
  • At Rest: Customer data stored on our systems is encrypted using AES-256 encryption
  • Email: We recommend using secure file transfer methods for sensitive documents; contact us for secure upload options

Access Controls

  • Role-based access controls limit data access to authorized personnel only
  • Multi-factor authentication required for all administrative access
  • Access logs maintained and regularly reviewed
  • Principle of least privilege applied to all system access

Infrastructure Security

  • Cloud infrastructure hosted on SOC 2 compliant providers
  • Regular security updates and patch management
  • Firewall protection and intrusion detection systems
  • Regular backups with secure, encrypted storage

Data Handling Practices

Document Security

  • Secure upload portal available for document submission
  • Documents processed in isolated, secure environments
  • Automatic deletion of working files after engagement completion
  • Secure deletion methods used for all data removal

No AI Training on Your Data

We do not use your documents or data to train artificial intelligence or machine learning models. Your data is used solely to provide the services you have requested.

Data Retention

  • Customer data retained only as long as necessary for business purposes
  • Standard retention period of 7 years for completed engagements
  • Data deletion available upon request, subject to legal requirements
  • Secure destruction of data at end of retention period

Personnel Security

  • Background checks conducted on personnel with access to customer data
  • Confidentiality agreements required for all team members
  • Regular security awareness training
  • Immediate access revocation upon personnel changes

Incident Response

We maintain an incident response plan to address potential security events:

  • 24-hour monitoring for security anomalies
  • Documented incident response procedures
  • Prompt notification to affected customers in the event of a data breach
  • Post-incident analysis and remediation

Third-Party Security

We carefully evaluate the security practices of our third-party service providers:

  • Vendors selected based on security certifications and practices
  • Data processing agreements in place with all vendors who handle customer data
  • Regular review of vendor security posture
  • Limited data sharing with vendors on a need-to-know basis

Your Role in Security

Security is a shared responsibility. We recommend the following practices:

  • Use strong, unique passwords for any accounts
  • Be cautious of phishing attempts—we will never ask for sensitive information via unsolicited email
  • Use secure methods when transmitting sensitive documents
  • Report any suspicious activity to us immediately
  • Keep your own systems and software up to date

Reporting Security Concerns

If you discover a security vulnerability or have concerns about the security of your data, please contact us immediately:

Bhumi LLC
Email: [email protected]
Subject: Security Concern

We take all security reports seriously and will respond promptly to investigate and address any issues.

B
Legal

Copyright © 2026 Bhumi LLC. All rights reserved.