Back to Home

Security & Compliance

Last Updated: May 2026 | HyperMartX PTY (LTD), trading as ASI Technologies

1. Our Security Commitment

ASI Technologies designs, builds, and operates engineering-grade systems. Security is not a feature we add — it is foundational to every line of code we write, every infrastructure decision we make, and every service we deliver. This document outlines our security posture, compliance alignment, and the measures we take to protect our clients' data and systems.

2. Regulatory & Compliance Framework

Our operations are aligned with the following South African and international standards:

POPIA

Protection of Personal Information Act, No. 4 of 2013. Full compliance with data subject rights, lawful processing, and Information Officer obligations.

Cybercrimes Act

Cybercrimes Act, No. 19 of 2020. We maintain incident response capabilities aligned with mandatory reporting obligations.

PCI-DSS Alignment

All payment processing is handled through PCI-DSS compliant gateways (Ozow, PayFast, Stripe). We do not store card data on our servers.

PAIA

Promotion of Access to Information Act. Our PAIA Manual is publicly available and maintained by our Information Officer.

3. Infrastructure Security

3.1 Hosting & Deployment

3.2 Application Security

3.3 Data Security

4. Incident Response

ASI Technologies maintains a formal incident response procedure aligned with the Cybercrimes Act's mandatory reporting requirements:

  1. Detection & Classification: Automated monitoring and alerting for anomalous activity. Incidents are classified P1–P4 per our SLA.
  2. Containment: Immediate isolation of affected systems to prevent lateral movement.
  3. Investigation: Root cause analysis conducted by the lead engineer on the engagement.
  4. Notification: Affected clients are notified within 72 hours of confirmed data breach (per POPIA Section 22). The Information Regulator is notified where required by law.
  5. Recovery & Remediation: Systems are restored from verified backups. Post-incident review and hardening measures are documented and implemented.
  6. Post-Incident Report: A formal incident report is provided to the client detailing timeline, impact, root cause, and preventative measures.

5. Employee & Contractor Security

6. Third-Party Risk Management

We vet all third-party services and sub-processors for security and compliance before integration. Our current third-party stack includes:

7. Vulnerability Disclosure

We welcome responsible security research. If you discover a vulnerability in any ASI Technologies system, please report it through our Responsible Disclosure Policy.

8. Contact

Security Team: security@asitechnologies.co.za

Information Officer: Asibonge Mlotshwa

Legal & Compliance: legal@asitechnologies.co.za

Registered Entity: HyperMartX PTY (LTD) · Reg No: 2025/218955/07