Security

We take security seriously. Here's how we approach it and how to report issues.

Our Practices

Data Protection

  • Encryption for data at rest and in transit
  • Minimal data collection principles
  • Regular security reviews
  • Secure development practices

Access Control

  • Strong authentication requirements
  • Principle of least privilege
  • Regular access reviews
  • Secure credential management

Incident Response

  • Clear escalation procedures
  • Prompt notification practices
  • Root cause analysis
  • Continuous improvement

Report a Vulnerability

If you've found a security issue in any of our projects or services, we'd like to hear about it. Please reach out directly so we can address it promptly.

Contact Us