Security
Last updatedJanuary 19, 2026
We take security seriously. This page outlines the technical and organizational measures we use to protect your data and keep the platform reliable.
Overview
Our security approach combines secure-by-default architecture, encryption in transit and at rest, least-privilege access controls, and continuous monitoring.
Encryption
TLS secures data in transit. Data at rest is encrypted using managed services and platform-native encryption.
Access Controls
We enforce least privilege, role-based access, and audited administrative actions. Secrets are managed securely.
Monitoring & Logging
We monitor uptime, performance, and security signals; logs support detection and response while respecting privacy.
Backups & Resilience
Regular backups and redundancy help protect against data loss and service disruption.
Incident Response
We follow a documented process for triage, containment, remediation, and communication. When appropriate, we notify affected users and relevant parties.
Vulnerability Disclosure
If you discover a vulnerability, please report it responsibly. Do not access data without authorization, and avoid actions that could degrade service.
Report a security issue
Contact our team with details so we can investigate and respond quickly.
We continuously improve our security posture and welcome feedback.
Thank you for helping keep users safe.