Trust Center

The following comprehensive security inventory demonstrates our unwavering commitment to data protection, offering complete transparency into the robust measures we implement to safeguard your valuable digital assets.

Controls

Controls are the specific safeguards and procedures we implement to protect your data and ensure our security promises are fulfilled in practice. These structured measures span across our infrastructure, organization, product development, and internal operations. Each control represents a concrete action or requirement—like requiring unique authentication for database access or implementing regular security training—that collectively creates a comprehensive security framework. We maintain transparency about these controls so you can understand exactly how we're protecting your information and evaluate our security posture with confidence.

Infrastructure security

Control
Status

Unique production database authentication enforced

The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.

Organizational security

Control
Status

Employee background checks performed

The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.

Organizational security

Control
Status

Security awareness training implemented

The company requires employees to complete security awareness training within thirty days of hire and at least annually thereafter.

Employee background checks performed

The company performs background checks on new employees.

Product security

Control
Status

Data transmission encrypted

The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.

Internal security procedures

Control
Status

Organization structure documented

The company maintains an organizational chart that describes the organizational structure and reporting lines.

Data and privacy

Control
Status

Customer data deleted upon leaving

The company purges or removes customer data containing confidential information from the application environment, in accordance with best practices, when customers leave the service.