Trust & Security

Security is a feature, not an afterthought

Share this skeleton with compliance, IT, or procurement stakeholders to show how Okhantu protects SME data and builds reliable verification rails.

Verification standards

Documents are hashed, encrypted in transit and at rest, and undergo automated expiry monitoring. When customers share artefacts with buyers or funders, the receiving party can audit the trace via tamper-evident logs.

POPIA alignment

We minimise data collection and assign every row of personal information to an accountable owner. POPIA clauses and operator agreements are embedded into onboarding so SMEs know exactly which datasets are being processed.

Incident readiness

The platform uses least-privilege access, mandatory MFA, and automated alerting. If a security incident ever occurs, our playbooks cover customer notification, legal obligations, and post-mortem transparency.