Data Protection
Data is protected in transit using modern TLS and handled with least-privilege access principles.
Security is an ongoing process. We prioritize clear controls, least-privilege access, and fast response when issues are reported.
Data is protected in transit using modern TLS and handled with least-privilege access principles.
Administrative access is restricted and reviewed. Sensitive operations are gated through role-based controls.
We continuously monitor the platform and apply security updates as part of regular release operations.
If you discover a vulnerability, report it privately so we can investigate and remediate quickly.
Step 1
Share issue details and reproduction notes by email so we can validate quickly.
Step 2
We assess scope, prioritize remediation, and apply mitigations as needed.
Step 3
After remediation, we confirm closure and share an appropriate status update.
For security questions, due diligence requests, or vulnerability reports, contact us directly.