Security Policy

1. Overview

At Validation Ledger, we prioritize the security and privacy of all stakeholders involved in the freight lifecycle—shippers, brokers, carriers, drivers, and factoring companies. Our platform is built on a foundation of zero-trust principles and verified identity, ensuring that only authenticated parties engage in business transactions. This policy outlines the controls we've implemented to preserve the confidentiality, integrity, and availability of our systems and data, particularly as they relate to fraud prevention, document verification, and user authentication.

2. Information Security Program

Validation Ledger maintains a robust, multi-layered information security program tailored for the unique challenges of the freight and logistics industry, including:
  • Regular Security Assessments & Audits: Routine code reviews, penetration tests, and third-party audits help us proactively identify and mitigate vulnerabilities.
  • Continuous Monitoring & Threat Detection: We leverage AWS CloudWatch, AWS WAF, and custom alerting for real-time threat monitoring across all environments.
  • Incident Response Procedures: Defined playbooks ensure swift containment, investigation, and communication of any potential security breach.
  • Employee Security Awareness Training: All staff are trained on phishing detection, data handling protocols, and secure development practices, including threat modeling.
  • Access Control & Authentication Measures: Access is granted strictly on a need-to-know basis using least privilege principles, supported by AWS Cognito, RBAC, and device binding.

3. Data Protection

Because Validation Ledger handles sensitive personal and business information—including driver IDs, freight documents, and identity verification artifacts—we apply rigorous controls to protect user data:
  • Encryption in Transit and at Rest: All data is encrypted using industry standards (TLS 1.2+ in transit, AES-256 at rest via AWS KMS).
  • Secure Backup & Disaster Recovery: Encrypted backups are stored redundantly across AWS regions with daily snapshots and recovery drills.
  • Vulnerability Management: We run weekly scans using tools like AWS Inspector and GitHub Dependabot to identify known CVEs.
  • Secure Development Lifecycle (SDLC): Security is integrated into our CI/CD pipeline, with tools like GitHub Actions enforcing pre-deployment checks and static code analysis.

4. Access Control

We enforce strict controls to prevent unauthorized access to sensitive systems:
  • Role-Based Access Control (RBAC): All user actions are scoped by role—broker, shipper, driver, etc.—and enforced in both UI and API layers.
  • Multi-Factor Authentication (MFA): MFA is required for all admin access and high-privilege operations. Driver-level security tiers also support facial and voice authentication.
  • Access Reviews & Audit Trails: Monthly access reviews are performed to validate role assignments. All access events are logged and stored immutably.
  • Password & Credential Policies: Passwords follow NIST guidelines and are rotated periodically. Secrets are managed using AWS Secrets Manager.

5. Incident Response

Validation Ledger maintains a mature incident response framework to handle cybersecurity events:
  • 24/7 Monitoring & Alerting: Security events are ingested by CloudWatch and AlertManager, triggering SMS/email alerts for critical thresholds.
  • Dedicated IR Team: Our response team includes security engineers, infrastructure leads, and customer support for cross-functional resolution.
  • Simulated Drills: Scheduled tabletop exercises are performed to evaluate our readiness for data breaches, impersonation attempts, and DDoS scenarios.
  • Clear Communication Protocols: Customers and stakeholders are notified through predefined channels based on severity, with post-mortem reports generated for every major incident.

6. Compliance

In compliance with CCPA/CPRA, users have the right to:
  • Request deletion of their personal data.
  • Request access to retained information.
  • Opt out of unnecessary data sharing.
We actively align our platform with industry standards and regulatory frameworks relevant to digital identity, freight brokerage, and data privacy:
  • Data Localization: User data is processed and stored within the United States to comply with legal and regulatory expectations for domestic freight operations.
  • Vendor & API Security: All third-party providers (e.g., AWS, ID verification APIs) are reviewed regularly for compliance and security posture.
  • Policy Reviews: Our security policies will be reviewed at least annually, or after any significant system change or security incident.

Data Retention and Disposal Policy

1. Purpose

This policy outlines how Validation Ledger manages the retention and secure disposal of personal and business data collected through our platform. Our practices are designed to comply with applicable regulations including the California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA).

2. Scope

This policy applies to all personal data, identity verification records, and associated documentation processed through the Validation Ledger platform by users in roles such as shipper, broker, carrier, driver, and factoring agent.

3. Data Retention Schedule

Data TypeRetention PeriodPurpose
User Identity Documents (e.g. DLs)3 years from account deactivationFraud resolution, compliance
Freight Transactions & BOLs7 yearsRegulatory record-keeping
Chat and Communication Logs2 yearsDispute resolution and auditability
Authentication Logs1 yearSecurity and access investigation
Unverified or Abandoned Accounts30 days post inactivityMinimize storage of stale personal information

4. User Rights

In compliance with CCPA/CPRA, users have the right to:
  • Request deletion of their personal data
  • Request access to retained information
  • Opt out of unnecessary data sharing

All verified deletion requests are processed within 45 days, with potential extensions as allowed by law.

5. Data Disposal Process

When data reaches the end of its retention period, it is securely deleted or anonymized:

  • Structured Data (e.g., MongoDB, DynamoDB): Programmatic deletion with backup purging
  • Unstructured data (e.g., S3 file objects): Lifecycle rules automatically delete expired documents
  • Backups: Redundant encrypted backups are retained and disposed after their lifecycle (typically 30-90 days)
  • Blockchain records: Immutable on-chain hashes are permanent, but off-chain personal metadata is purged

6. Policy Review and Contact

This policy is reviewed annually or after any significant legal, technical, or operational change. For questions or data deletion requests, users can contact: admin@validationledger.com