The following comprehensive security inventory demonstrates our unwavering commitment to data protection, offering complete transparency into the robust measures we implement to safeguard your valuable digital assets.
Controls are the specific safeguards and procedures we implement to protect your data and ensure our security promises are fulfilled in practice. These structured measures span across our infrastructure, organization, product development, and internal operations. Each control represents a concrete action or requirement—like requiring unique authentication for database access or implementing regular security training—that collectively creates a comprehensive security framework. We maintain transparency about these controls so you can understand exactly how we're protecting your information and evaluate our security posture with confidence.
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
The company requires employees to complete security awareness training within thirty days of hire and at least annually thereafter.
The company performs background checks on new employees.
The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.
The company maintains an organizational chart that describes the organizational structure and reporting lines.
The company purges or removes customer data containing confidential information from the application environment, in accordance with best practices, when customers leave the service.