Skip to content Skip to footer

Security Policy

Security Policy

At Gaming Tech Labs, a division of White Light IT Solutions LLC, we are committed to maintaining the highest standards of security for all data, systems, and services. This Security Policy outlines our approach to safeguarding information, infrastructure, and the interests of our clients, partners, and users.

1. Information Security Commitment

We prioritize the confidentiality, integrity, and availability of all data entrusted to us. Our systems are designed with robust security controls to prevent unauthorized access, data breaches, and cyber threats.

2. Infrastructure Protection

  • All systems and servers are hosted in secure environments with restricted access
  • Regular vulnerability assessments and penetration tests are conducted
  • Firewalls, intrusion detection/prevention systems (IDS/IPS), and threat monitoring tools are actively used
  • Access to systems is managed through role-based access control (RBAC)

3. Data Handling and Storage

  • Data is encrypted during transmission (SSL/TLS) and at rest using industry-standard encryption protocols
  • We maintain strict controls over the storage, retrieval, and disposal of sensitive information
  • Personal data is handled in accordance with international privacy and data protection laws

4. User Access and Authentication

  • Multi-factor authentication (MFA) is enforced for system-level access
  • Password policies ensure strong credentials and periodic updates
  • Session timeouts and access logs are implemented to monitor and manage usage

5. Software and Application Security

  • All applications undergo thorough security testing, including static and dynamic code analysis
  • Secure coding standards and peer reviews are mandatory during development
  • Third-party integrations are carefully vetted for compliance and security

6. Incident Response

  • A dedicated incident response team is in place to handle security events
  • In the event of a breach or attempted intrusion, immediate steps are taken to mitigate risks and notify affected parties as required
  • Logs are maintained for forensic analysis and reporting

7. Employee Awareness and Training

  • All employees undergo regular training on cybersecurity best practices, phishing awareness, and secure data handling
  • Strict policies are enforced to prevent insider threats and misuse of data

8. Physical Security

  • Our offices and data centers implement physical access controls, CCTV surveillance, and visitor logging
  • Only authorized personnel are allowed in restricted zones

9. Continuous Improvement

We are committed to continually enhancing our security protocols in line with evolving threats, industry best practices, and regulatory requirements.

10. Contact Us

For any questions related to our security practices, to report a security concern, or to request additional information, please contact:

White Light IT Solutions LLC (1783603)
Office No.B 2905, 29th Floor, Latifa Tower
Sheikh Zayed Road, Dubai 454487
Phone: +44 7397212778
Email:

For General Queries: admin@gamingtechlabs.com

For Certificate Validations: cert@gamingtechlabs.com