SECURITY

Security & Trust

How Markoni protects guest data, hospitality operations, and the platforms we connect to. ISO 27001 certified. SOC 2 Type II report available on request.

Last updated5 May 2026
Legal entityDeepNav Experiences Pvt Ltd

Hospitality, travel and experiences operators trust Markoni with Guest conversations, booking workflows, operational data, staff visibility and connected property systems. Security is therefore a core product requirement.

Markoni is built by DeepNav Experiences Private Limited, operating under the brand GydeXP.

This page explains our current security posture, architecture principles and compliance roadmap. We are intentionally transparent: Markoni is an early-stage product, and we do not claim security certifications that we do not yet have.

1. Current security posture

Markoni is designed with security-conscious architecture and SOC 2-aligned operating practices.

Current status:

When certifications, attestations or formal audit reports are available, this page will be updated.

For security questionnaires, contact contact@gydexp.com.

2. Security philosophy

Markoni is built around the following security principles.

2.1 Least privilege

Users, employees, vendors, systems and integrations should only receive the minimum access necessary to perform their role.

2.2 Human accountability

AI can assist with Guest workflows, but sensitive, uncertain or high-impact actions should escalate to human staff according to configuration.

2.3 Grounded AI behavior

AI should answer using approved property data, tools and knowledge sources. It should avoid inventing rates, availability, policies or commitments.

2.4 Auditability

Important actions should be logged and reviewable wherever technically feasible.

2.5 Secure by default

Security controls should be built into product workflows, not added as an afterthought.

2.6 No false trust claims

We will not claim certifications or compliance statuses before they are actually achieved.

3. What data Markoni may process

Depending on deployment, Markoni may process:

We aim to minimize access to only what is required for the configured workflow.

4. Access control

Markoni is designed to support:

Customers are responsible for managing access for their own staff, including removing access when staff leave or roles change.

5. Internal access management

Internal access to production systems should be limited to authorized team members who need access for development, support, deployment, incident response, customer success, compliance or operations.

Our intended internal access practices include:

6. Data encryption

Markoni is designed to use:

No full payment card numbers are intended to be stored by Markoni. Payment processing is handled by third-party payment providers, including Razorpay where applicable.

7. Application security

Markoni's application security practices are intended to include:

As the product matures, we intend to strengthen secure SDLC, code review, vulnerability scanning, dependency review, environment hardening and security testing.

8. API and webhook security

Where applicable, Markoni is designed to use:

Customers should not share API keys, tokens or credentials with unauthorized parties.

9. AI safety controls

Because Markoni operates in Guest-facing environments, AI safety is a security and trust issue.

Our intended controls include:

Markoni should not be deployed for high-risk use cases without appropriate human review and Customer-side controls.

10. Human escalation

Markoni is designed to escalate when:

Escalations may be routed through dashboard, WhatsApp, email, staff task systems or other configured channels.

11. Audit logs and visibility

Markoni is designed to support auditability for important events, such as:

Logging depth may vary depending on product stage, plan, integration and deployment configuration.

12. Vendor and subprocessor management

Markoni may rely on third-party vendors for:

Our vendor management process is being formalized as part of compliance readiness.

We intend to review vendors based on:

A formal subprocessor list will be published as our enterprise compliance program matures.

13. Infrastructure security

Markoni's infrastructure may include cloud hosting, managed databases, storage, serverless services, queues, APIs and third-party communication providers.

Our intended infrastructure controls include:

14. Payment security

Markoni may generate or send payment links through third-party payment providers, including Razorpay.

We do not intend to store full card numbers or sensitive card authentication data on Markoni systems.

Payment providers are responsible for processing card or payment credentials according to their own security and compliance standards.

Customers remain responsible for Customer-side payment policies, refunds, cancellations, disputes, taxes and Guest-facing payment terms unless agreed otherwise.

15. Data retention and deletion

Retention depends on the Customer agreement, deployment configuration, legal requirements and operational needs.

Indicative retention categories include:

Customers may request deletion or export according to contractual terms and applicable law.

Some data may be retained where necessary for security, legal, tax, audit, dispute resolution or compliance purposes.

16. Incident response

If we identify a security incident, our intended response process includes:

  1. 1. Detect and triage the issue.
  2. 2. Contain affected systems where required.
  3. 3. Investigate scope and impact.
  4. 4. Preserve relevant logs and evidence.
  5. 5. Remediate the issue.
  6. 6. Notify affected Customers where legally or contractually required.
  7. 7. Document findings.
  8. 8. Improve controls based on lessons learned.

Notification timing may depend on applicable law, contractual obligations, incident severity and investigation requirements.

17. Business continuity and resilience

Our resilience practices are being built as the product matures. They may include:

Specific uptime commitments, support commitments or service credits apply only if agreed in a signed contract.

18. Customer responsibilities

Security is shared between Markoni and the Customer.

Customers are responsible for:

19. Responsible disclosure

If you believe you have found a vulnerability, report it responsibly.

Email: contact@gydexp.com

Please include:

Please do not:

We do not currently operate a paid bug bounty program unless explicitly announced.

20. Compliance roadmap

Our near-term compliance roadmap includes:

We will update this page as our program matures.

21. Security contact

For security questionnaires, vendor reviews, responsible disclosure, compliance questions or suspected vulnerabilities, contact us at:

DeepNav Experiences Private Limited

Product: Markoni by GydeXP

Email: contact@gydexp.com

Address: Site 128 Kno 340/302/128, 2nd Floor, Tharabanahalli, Bettahalsur, Bangalore North, Karnataka, 562157

Please include enough detail for us to investigate the issue, including affected URLs, endpoints, workflows, screenshots, logs and steps to reproduce where safe to share.