Contact US

CRM

Security & Data Protection

Last Updated: January 2026

Overview

At TRIGGANT Technologies FZ‑LLC (“Triggant,” “we,” “our,” or “us”), protecting the security, privacy, and integrity of your data is a top priority. This Security & Data Protection Statement explains our approach to safeguarding information across our platforms, including Triggant CRM, IT services, and related digital environments.

1. Scope

This Statement applies to all Triggant systems that process customer data, including:

  • triggant.com (corporate site, service inquiries)

  • crm.triggant.com (CRM and software platforms)

  • Backend systems, APIs, analytics, and integrations that support our services.

2. Security Governance and Responsibility

Triggant maintains a formal security governance framework that includes:

  • Designated security and data protection leadership

  • Defined roles and responsibilities for secure operations

  • Regular security reviews and policy updates

Senior management oversees strategic security direction, and all personnel are bound by security obligations.

3. Technical Security Measures

We implement multiple layers of technical safeguards to ensure confidentiality, integrity, and availability of data:

Encryption

  • Data in transit is protected using SSL/TLS protocols.

  • Data at rest is encrypted using industry‑standard methods.

Access Control

  • Role‑based access ensures users and systems only see what they are authorized to access.

  • Multi‑Factor Authentication (2FA) is supported to strengthen account security.

Infrastructure Protection

  • Firewalls, intrusion detection/prevention systems, and robust monitoring.

  • Regular vulnerability scanning and patch management to reduce exposure.

4. Data Protection and Privacy

We treat data privacy with seriousness and comply with applicable data protection laws including UAE PDPL and relevant regulations:

Data Minimization & Purpose Limitation

We collect only data necessary to provide and improve services.

Third‑Party Data Sharing

We share data with trusted service providers only when needed to deliver services (e.g., hosting, analytics, integrations) under strict contractual safeguards.

Data Subject Rights

Clients and users may request access, correction, deletion, or restriction of their personal data in accordance with applicable law.

5. Monitoring and Audits

To ensure ongoing protection:

  • Regular internal and third‑party security assessments are conducted.

  • Automated monitoring detects suspicious activity.

  • Infrastructure and application logs are reviewed to identify risks early.

6. Incident Response

In the unlikely event of a security incident:

  • We investigate and contain the issue promptly.

  • Affected users and authorities are notified as required by law.

  • Post‑incident analysis is performed to prevent recurrence.

7. Continuous Improvement

Security is an ongoing commitment:

  • We update controls based on emerging threats and industry standards.

  • Employees receive security awareness training.

  • Technologies and policies are reviewed to maintain resilience.

8. User Responsibilities

Users share responsibility for protecting their accounts and data:

  • Use strong, unique passwords and enable 2FA.

  • Keep login credentials confidential.

  • Report suspected security issues promptly.

9. Contact Information

For questions, concerns, or to report a potential security issue:

Triggant Technologies FZ-LLC
Email: [email protected]
Phone: +971 555067851

Address: FDRK8701 Compass Building, AL Hamra FZ, RAK – United Arab Emirates

Trusted IT Services & Software Development Company in Dubai | Triggant

FDRK8701 Compass Building,

AL Hamra FZ, RAK - UAE

+971 48763006 | +971 555067851