Trust & Security
Security is a feature, not an afterthought
Share this skeleton with compliance, IT, or procurement stakeholders to show how Okhantu protects SME data and builds reliable verification rails.
Verification standards
Documents are hashed, encrypted in transit and at rest, and undergo automated expiry monitoring. When customers share artefacts with buyers or funders, the receiving party can audit the trace via tamper-evident logs.
POPIA alignment
We minimise data collection and assign every row of personal information to an accountable owner. POPIA clauses and operator agreements are embedded into onboarding so SMEs know exactly which datasets are being processed.
Incident readiness
The platform uses least-privilege access, mandatory MFA, and automated alerting. If a security incident ever occurs, our playbooks cover customer notification, legal obligations, and post-mortem transparency.