Security Overview

Security Overview

We take security seriously and implement administrative, technical, and physical safeguards to protect your data.

1. Infrastructure & Encryption

  • Hosting with reputable cloud providers and hardened configurations
  • Encryption in transit (TLS) and at rest for sensitive data
  • Network segmentation and firewalling

2. Access Controls

  • Role-based access controls and least-privilege principles
  • Multi-factor authentication for administrative access
  • Audit logging of key actions

3. Development Practices

  • Secure software development lifecycle and code review
  • Dependency monitoring and timely patching
  • Static/dynamic security testing where appropriate

4. Incident Response

We maintain an incident response process for detection, assessment, containment, and notification as required by law and contracts.

5. Responsible Disclosure

We welcome good-faith reports of vulnerabilities. Contact security to disclose a potential issue. Do not access or modify data without authorization.


All Legal & Policy Pages