Security
How we approach protecting your data.
Our Approach
We take reasonable measures to protect your data. While no system is completely immune to risk, we follow common security practices and continuously work to improve our security posture.
Security Practices
Encryption
Data is encrypted in transit and at rest using industry-standard protocols.
Infrastructure
Hosted on reputable cloud providers with regular security updates and monitoring.
Access Control
Role-based permissions ensure users only access what they need.
Audit Logs
Activity logs help you track changes and maintain accountability.
Your Responsibilities
Security is a shared responsibility. We recommend using strong, unique passwords, enabling two-factor authentication when available, and being cautious about who you grant access to your account.
Reporting Issues
If you discover a potential security issue, please let us know. We appreciate responsible disclosure and will work to address valid concerns promptly.