Security & Trust

Your community’s data is sacred—we keep it protected.

MasjidFundly combines enterprise-grade security, privacy by design, and compliance alignment to safeguard every record.

Core Principles

Security woven into every layer.

  • Encryption: TLS 1.3 in transit, AES-256 at rest.
  • Access controls: Role-based permissions, MFA, SSO with Okta and Azure AD.
  • Monitoring: 24/7 security operations center with anomaly detection.

Certifications & Standards

  • SOC 2 Type II attestation in progress (expected Q1 2026).
  • PCI-DSS Level 1 compliant payment partners.
  • HIPAA-aware processes for health-related school data.
Data Residency

Choose where your data lives.

Host in the United States, Canada, UK, EU (Frankfurt), or GCC (Dubai). Data never leaves the region you select.

Redundancy

Multiple availability zones with 99.9% uptime and automated failover.

Backups

Encrypted backups every 30 minutes; 35-day retention with point-in-time recovery.

Disaster Recovery

Documented and tested annually, with RPO of 15 minutes and RTO of 2 hours.

Privacy

Respectful data practices.

  • Consent-based communication and clear opt-out flows.
  • Data processing agreements for every sub-processor.
  • Dedicated privacy officer and annual training for staff.

AI Safeguards

Our AI models operate within controlled environments with strict guardrails.

  • No training on personal messages without consent.
  • Explainable recommendations with human override.
  • Bias monitoring with external ethics advisors.
Vendor Ecosystem

Trusted partners.

AWS
Microsoft Azure
Cloudflare
Stripe

“Security reviews with our board were seamless—MasjidFundly provided detailed documentation and helped us meet regional compliance requirements.”

Najla Karim Board Treasurer, London Faith Collective

Request Documentation

  • SOC 2 readiness summary
  • Penetration test executive report
  • Data processing agreement (DPA)
Request access
Need a security review?

We’ll collaborate with your IT and compliance teams.

Schedule a session to walk through architecture diagrams, policies, and controls tailored to your requirements.

Book a security briefing