Security and Privacy / NitaxInfo
Data Security Is Our Foundation.
Tax documents, FIRS notices, client records, and financial statements sit at the center of trust. NitaxInfo is built to protect them with encryption, privacy controls, resilient infrastructure, and strict access boundaries.
AES-256
Encryption standard
99.9%
Platform availability target
Zero training
Uploads are excluded from model training
Scoped access
Permissions stay role-based and audited
Raw Security Investment
NitaxInfo's Commitment to Security
Sensitive tax workflows need more than generic cloud language. These are the core promises behind how the platform handles your records.
Your data stays yours
Protected at every layer
Privacy is non-negotiable
Secure by Default
Every Byte, Encrypted.
Data moving through NitaxInfo and data stored for product operations are both protected with modern encryption controls and managed key handling.
Data in Transit
TLS 1.3Requests between your device and the platform travel over encrypted channels with modern handshake and key exchange controls.
Data at Rest
SecureStored documents and related service records remain inside encrypted storage layers with managed key controls.
Secure Infrastructure
Built on Secure, Resilient Infrastructure.
24/7 Monitoring
Automated alerting flags unusual access patterns, traffic spikes, and service anomalies in real time.
DDoS Protection
Layered edge controls reduce exposure to volumetric and application-layer attacks.
Network Isolation
Core workloads are separated inside private network boundaries rather than exposed directly to the public internet.
Infrastructure Summary
Compute / Runtime
Managed cloud infrastructure with hardened service boundaries, encrypted storage, and monitored runtime paths.
Protection Checklist
Regional Data Residency
Storage choices and deployment patterns are reviewed against privacy, performance, and customer expectations.
High Availability
Recovery planning focuses on redundancy, backup integrity, and fast restoration when a subsystem degrades.
Strict-Scoped Access Controls
Only Authorised Personnel. Only When Necessary.
Access to product functions is narrowed by role and audited so that operational support does not become blanket visibility into client work.
| Role | Doc Access | Queries | Admin | Audit |
|---|---|---|---|---|
| User | Own only | Own only | None | None |
| Company Admin | All users | All | Yes | Yes |
| Support Staff | None | None | No | Read |
| Security Audit | None | None | None | Full |
Role-Based Permissions
Each workspace action is tied to a role so users only see the records relevant to their responsibility.
Multi-Factor Authentication
Administrative access can be reinforced with secondary verification and session checks.
Access Audit Logs
Important actions leave reviewable traces to support investigations and internal governance.
No Raw Document Access by Staff
Support and security workflows are designed to avoid unrestricted staff access to client uploads.
Data to Trust About Privacy
A Clear Privacy Commitment
Privacy should read like an operating principle, not a vague promise. This is the short version of what the platform does and never does.
What NitaxInfo Does
What NitaxInfo Never Does
Confidentiality is foundational. If a system compromises trust in your tax records, it is not fit for the workflow.
NitaxInfo Privacy CommitmentResponsible AI Layer
AI With Guardrails, Not Guesswork.
NitaxInfo is positioned as a constrained research system for professional tax work, not an unrestricted chatbot with invisible assumptions.
Citation Required Mode
Answers are designed to point back to statute, regulation, or official source material instead of unsupported claims.
Hallucination Reduction
Retrieved context and guardrails reduce free-form speculation during professional tax workflows.
Confidence Levels
Responses can communicate how directly the available source material supports the answer.
Mandatory Disclaimer
Outputs are positioned as research assistance, not a substitute for qualified tax or legal judgement.
AI Safety Stack
User Query
Input validation and policy checks
Nigerian Tax Corpus
Retrieved context over trusted source collections
Citation Layer
Answers are structured around source references and caveats
Structured Output
Response, source, caveat, and disclaimer stay explicit
Penalty-generation is blocked
Outputs should not invent liabilities, penalties, or legal certainty without source-backed support.
Nigeria Data Protection
Aligned with the Nigeria Data Protection Framework
Our data handling approach is designed around the expectations behind Nigeria's privacy regime: lawful processing, minimisation, user rights, and documented accountability.
Lawful Basis for Processing
Processing is tied to legitimate product use, service delivery, and consent-driven workflows where appropriate.
Your Rights as a Data Subject
Users may ask for access, correction, deletion, or portability of the information we keep for service delivery.
Data Minimisation
We aim to collect and retain only the information required to operate the product safely and effectively.
Data Subject Requests
To request access, correction, or deletion of the information attached to your account or firm workspace, contact our privacy channel directly.
Submit a Data RequestIts Best Practice
If Something Goes Wrong, We Are Fast.
Response discipline matters as much as prevention. Detection, containment, remediation, and communication are handled through an incident workflow.
Detection and Assessment
Alerting and triage processes classify the event, assess probable impact, and escalate the right responders quickly.
Containment and Remediation
Affected services can be isolated while the team removes the cause, patches exposure, and validates recovery.
User Notification
Where legally required, affected users are notified with clear updates on impact, remediation, and next actions.
Incident Response Timeline
Automated alert triggered
Monitoring identifies an abnormal event and opens response handling.
Initial assessment
Severity, probable scope, and escalation path are confirmed.
Containment
Impacted services, credentials, or workloads are isolated.
Remediation
Root cause removal, hardening, and validation continue until stable.
User notification
Notifications and guidance are shared where impact is confirmed.
Service restoration
Operations return to steady state with a post-incident review.
Continuous Improvement
Security Is Never Finished.
Controls need regular review. Security work stays continuous as the product, infrastructure, and regulations evolve.
Infrastructure Updates
Core services, runtimes, and dependencies are patched regularly to reduce exposure windows.
Vulnerability Management
Security review work includes hardening checks, analysis, and recurring risk review cycles.
AI Safety Reviews
Guardrails, citations, and answer framing are reviewed whenever the product surface evolves.
Access Reviews
Internal permissions are revisited on a scheduled basis and removed when no longer justified.
Questions About Security?
Whether you are evaluating NitaxInfo for a firm, due diligence process, or a privacy question, the security team can route you to the right answer.
Security Questions
security@nitaxinfo.com.ngQuestions about controls, architecture, or platform security practices.
Data Protection Officer
privacy@nitaxinfo.com.ngRequests relating to access, correction, deletion, or other data subject rights.
Responsible Disclosure
security@nitaxinfo.com.ngReport suspected vulnerabilities or incidents through a monitored security channel.
Built for Trust. Ready When You Are.
Confidence in the answer should extend to the safety of every document, user, and workspace inside the platform.
Live in confidence. No additional setup required.