Security

Your security is our top priority. Learn about our security practices and policies.

Infrastructure Security
Enterprise-grade security for your applications
  • • SOC 2 Type II compliant infrastructure
  • • End-to-end encryption in transit and at rest
  • • Regular security audits and penetration testing
  • • 24/7 security monitoring and incident response
Data Protection
Your data is protected with industry best practices
  • • GDPR and CCPA compliant data handling
  • • Data minimization and retention policies
  • • Secure data centers with physical security
  • • Regular backups with encryption
Privacy
We respect your privacy and protect your personal information
  • • No tracking or analytics on your applications
  • • Minimal data collection for service operation
  • • Transparent privacy policy
  • • User control over data sharing
Compliance
Meeting industry standards and regulations
  • • SOC 2 Type II certification
  • • GDPR compliance for EU users
  • • CCPA compliance for California residents
  • • Regular compliance audits

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly:

  • • Email us at [email protected]
  • • Provide detailed information about the vulnerability
  • • Allow us reasonable time to address the issue
  • • We'll acknowledge your contribution publicly (if desired)

Security Documentation

For more detailed information about our security practices, please review our security documentation.