Security

How we handle your data.

Carrier invoices and rate sheets are sensitive commercial information. Here's how we protect everything you share with us — and the controls you get in return.

Security pillars

Defense in depth, end-to-end.

01

Encryption everywhere.

All traffic to kadimalogistics.com is served over TLS 1.2+ with HSTS. Customer data at rest is encrypted using AES-256 on vetted cloud infrastructure.

02

Access controls.

Role-based access with the principle of least privilege. SSO and MFA are required for all employees and contractors accessing customer data.

03

Hardened infrastructure.

We host on SOC 2 / ISO 27001 certified cloud providers. Networks are segmented, patched on a defined cadence, and continuously monitored.

04

Vendor diligence.

Every sub-processor that touches customer data is reviewed for security posture, data handling, and contractual confidentiality obligations.

05

Secure development.

We follow a documented SDLC with code review, dependency scanning, secret scanning, and regression testing on every change.

06

Incident response.

We maintain a written incident response plan with defined severity tiers and customer notification commitments for confirmed incidents.

You stay in control of your carrier relationships.

We collect only what is needed to audit invoices, benchmark rates, and negotiate on your behalf — typically invoices, rate sheets, and basic shipment profiles. We never sell or share your data with competitors.

You retain ownership of all data you share with us. You can request export or deletion of your information at any time by emailing security@kadimalogistics.com.

We retain customer data only as long as needed to provide services and meet legal obligations. When retention is no longer required, data is securely deleted or de-identified.

Responsible disclosure

We welcome reports from security researchers and customers. If you believe you've found a vulnerability in our website or services, please email security@kadimalogistics.com with steps to reproduce.

We commit to acknowledging valid reports within two business days and working with you in good faith. Please do not publicly disclose issues before we've had a reasonable opportunity to remediate.

Talk to security

Questions about compliance, sub-processors, or how we store data?

We'll walk your team through it. Send us a note and a senior engineer will reply, not a queue.

Contact security  →