Data Security Policy

This policy outlines the security measures implemented to protect data integrity, confidentiality, and system reliability within the VeriMaji platform.

VeriMaji - Secure Verification

Effective Date: 5 January 2026
Last Updated: 5 January 2026

Policy Overview

This Fraud Reporting Policy defines the procedures for identifying, reporting, and handling suspected fraudulent or unauthorized documents within the VeriMaji secure verification ecosystem.

What Constitutes Fraud
  • Invalid, expired, or revoked documents
  • Tampered QR codes or reference IDs
  • Mismatched holder or document details
  • Unauthorized use of credentials
Reporting a Suspicious Document

Suspected fraud can be reported directly through the VeriMaji application using the built-in reporting mechanism with accurate verification details.

Information Collected During Reporting
  • Reference ID or QR verification data
  • Date and time of verification
  • System validation response
  • User-provided remarks (optional)
  • Audit log references
  • No unnecessary personal data
Investigation & Action

All reports are reviewed by the authorized legal and security team at SoftMaji InfoTech Pvt. Ltd.

Secure audit trails and verification logs are used for analysis.

Corrective action may include record updates, access restrictions, or legal escalation if required.

Confidentiality & Misuse

Fraud reports are handled with strict confidentiality and are accessible only to authorized personnel.

False or malicious reporting may result in restricted access and legal action under applicable laws.

By using the VeriMaji platform, users agree to comply with this Fraud Reporting Policy and associated security guidelines.