Quikkred
Loading your experience...
Quikkred
Loading your experience...
⚠️ IMPORTANT: Only make loan repayments through our official website Quikkred.com or Quikkred mobile app. Never share OTP or passwords.
Protecting Your Digital Assets
Effective Date: January 1, 2026
This policy sets out the rules and guidelines for the secure and appropriate use of QuikkRed's Information Technology (IT) resources. It applies to all employees, contractors, vendors, and any third parties who have access to QuikkRed's IT infrastructure, systems, applications, and data.
Objective: To protect QuikkRed's sensitive data, systems, and assets from unauthorized access, misuse, disclosure, disruption, modification, or destruction, while ensuring compliance with applicable laws and regulatory requirements including RBI guidelines for NBFCs.
All data handled by QuikkRed shall be classified into the following categories:
Company IT resources are provided primarily for business purposes. Limited personal use is permitted provided it does not:
| Role | Responsibilities |
|---|---|
| All Users | Comply with this policy and all related security procedures. Report any security incidents or suspicious activities immediately. Protect credentials and not share passwords. Complete mandatory security awareness training. |
| IT Department | Implement and maintain technical security controls. Manage user access and authentication systems. Monitor systems for security threats. Conduct regular security assessments and vulnerability scans. Maintain and test backup and disaster recovery systems. |
| Chief Information Security Officer (CISO) | Develop and maintain information security policies and procedures. Oversee the implementation of security controls across the organization. Report to the Board on security posture and incidents. Ensure compliance with regulatory requirements. Lead security incident response and investigations. |
Chief Information Security Officer (CISO): Mr. Rohan Verma
Contact Email: ciso@quikkred.com