Infrastructure Security
- All data is encrypted in transit using TLS 1.2+
- All data is encrypted at rest using AES-256 encryption
- Infrastructure hosted on enterprise-grade cloud providers
- Regular security updates and patch management
- Continuous monitoring and alerting systems
- Redundant data storage across multiple locations
Data Privacy & Protection
- Data processed and stored in the United States
- No training of AI models on customer data
- Data processing agreements available upon request
- GDPR-compliant data handling practices
- Clear data deletion and retention policies
- Regular security assessments and updates
Access Control
Authentication
- Email-based authentication
- Google SSO integration available
- Automated account lockout protection
- Session management and timeout enforcement
- Optional two-factor authentication
Authorization
- Role-based access control
- Granular permission settings
- Regular access reviews
- Audit logging of key actions
Application Security
- Secure development practices
- Regular dependency updates and security patches
- Vulnerability scanning and monitoring
- API endpoint authentication required
- HTTPS-only access
- Protection against common web vulnerabilities
Operational Security
- Documented incident response procedures
- Regular backup and recovery testing
- Business continuity planning
- 24/7 infrastructure monitoring
- Security logging and alerting
- Vendor security assessment
Employee Security
- Background checks for employees
- Security awareness training
- Strict access control policies
- Secure device management
- Regular security policy reviews
Compliance
- Privacy policy available at Privacy Policy
- Terms of service available at Terms
- Data processing agreements available
- Regular compliance reviews
- Enterprise security reviews available upon request
Reporting Security Issues
If you discover a security issue, please notify us immediately:
Email: [email protected]
Response Time: Within 24 hours
For general security inquiries:
Email: [email protected]
Enterprise Security
Enterprise customers receive additional security features and support:
- Custom data retention policies
- Advanced access controls
- Dedicated security contact
- Priority incident response
- Custom security reviews
Contact our enterprise team to learn more about our advanced security offerings.