Skip to main content
Bildux Logo

Security

1. Scope

This Security Policy applies to all users of BilduX (trainees, organisations, and providers) and governs the security of accounts, data, and platform usage.

2. User Responsibilities

Users are responsible for keeping their login credentials (email and password) confidential.

Strong, unique passwords must be used; BilduX may enforce minimum password requirements.

Users must notify BilduX immediately in case of suspected unauthorized access.

Sharing accounts with third parties is prohibited.

Organisations and providers are responsible for ensuring that only authorized representatives access their accounts.

3. BilduX Security Measures

BilduX takes appropriate technical and organisational measures to protect user data, including but not limited to:

- Encrypted connections (TLS/SSL) for all data transmission.

- Secure password storage with hashing.

- Regular system monitoring and logging.

- Access controls to restrict internal data handling.

- Regular security audits and updates.

For details on how personal data is processed, see our Privacy Policy.

4. Incident Management

In case of a data breach or security incident, BilduX will notify affected users and relevant authorities in line with legal requirements (e.g., GDPR breach notification rules).

Users must cooperate with BilduX in investigating potential incidents.

5. Misuse and Fraud

Attempts to hack, disrupt, or misuse the BilduX platform are strictly prohibited.

Suspicious activities (e.g., automated scraping, brute force login attempts, fraudulent offers) will result in account suspension or termination.

BilduX reserves the right to take legal action against misuse.

6. Enforcement

Violations of this Security Policy may lead to:

- Temporary account suspension.

- Permanent account termination.

- Legal proceedings where applicable.

7. Liability Disclaimer

BilduX implements industry-standard security measures but cannot guarantee absolute protection against all threats.

Users acknowledge that they use the platform at their own risk and remain responsible for securing their own devices and networks.