Security
Last updated: 2026-03-01
Security Overview
We encrypt data in transit and at rest, and continuously monitor for vulnerabilities.
Access Controls
Access to sensitive data is restricted by role-based controls and audit logging.
Incident Response
We maintain a documented response process for security incidents and customer notifications.