Security Overview
Effective date: February 10, 2026
This Security Overview describes our general approach to protecting the Service and customer information. It is provided for transparency and does not create any warranty, guarantee, or contractual commitment beyond what is stated in our Terms.
Our Approach
- Access controls: we restrict access to production systems and data to authorized personnel.
- Encryption: we use encryption in transit (HTTPS/TLS) and use encryption at rest where supported by our infrastructure.
- Monitoring and logging: we monitor systems for reliability and security and maintain logs for troubleshooting and abuse prevention.
- Backups and recovery: we maintain backups and recovery procedures designed to reduce data loss risk.
Your Responsibilities
- Use strong passwords and protect your account credentials.
- Keep your contact details up to date so you receive important notices.
- Notify us promptly if you believe your account has been compromised.
Reporting Security Issues
If you believe you have found a security vulnerability, please report it responsibly by emailing [email protected] with details and steps to reproduce. Please do not publicly disclose the issue until we have had a reasonable opportunity to investigate and remediate.