Security Practices
Your data’s safety is our top priority.
1. Infrastructure Security
Our platforms are hosted on secure cloud providers with hardened configurations, firewalls, and routine vulnerability patching.
2. Data Encryption
All data is encrypted in transit using HTTPS/TLS and at rest when supported by storage services.
3. Access Control
We enforce strict role-based access control (RBAC), audit logging, and multi-factor authentication for all internal systems.
4. Third-Party Services
We evaluate all third-party services for security compliance and maintain signed data processing agreements where applicable.
5. Responsible Disclosure
If you discover a vulnerability in one of our platforms, please report it to us. We’ll investigate promptly and acknowledge your contribution.
6. Contact
For security inquiries, reach out to us.