Legal

Security Policy

Last updated: May 7, 2026

Encrypted everywhere
TLS in transit, AES-256 at rest.
Least privilege
Role-based access and tenant isolation.
Hardened infrastructure
Managed cloud with audited providers.
Continuous monitoring
Logging, alerting, and routine reviews.