Security and Compliance

This page explains the measures and protocols we use to protect the confidentiality, integrity, and security of your data.

Data Security and Compliance

Certified Data Centers

To ensure a high standard of security for our users, our company relies on certified data centers. These modern facilities follow strict industry standards such as ISO/IEC 27001 to protect your data.

Encryption

We use modern encryption protocols to protect your information during transmission and storage. Data sent from your browser to our servers is encrypted with TLS using modern ciphers. Personal data is stored in encrypted form.

File Retention and Removal

We store your files only as long as needed for their intended use. They are automatically deleted within 24 hours or immediately if you click the 'Delete' button.

Payment Information

We use Stripe and PayPal for payment processing. Both are certified under the Payment Card Industry Data Security Standards (PCI DSS). They process payments on our behalf, and credit card numbers are never shared with us.

GDPR

Our company complies with the General Data Protection Regulation (GDPR), a set of rules designed to protect your personal data. GDPR compliance gives you control over your data and ensures that it is processed securely and responsibly. You can download a data processing agreement (DPA) at any time from the user dashboard.

Network and Infrastructure Security

Network Communications

Our network uses modern technologies to protect against threats. A Content Delivery Network (CDN) ensures fast and secure data access. Security measures such as DDoS protection help safeguard your information. This setup protects your data from evolving threats and supports continuous access.

Network Security

We use modern technologies and strong protocols to protect against unauthorized access, data breaches, and cyber threats. Our multi-layered system includes firewalls, intrusion detection, and encryption to secure your data in transit and at rest. Ongoing monitoring and updates to our defenses help keep our environment resilient and secure.

Availability & Fault Tolerance

We use redundant systems, real-time monitoring, and a resilient architecture to reduce downtime and maintain continuous access. In case of unexpected events or system failures, our fault-tolerant design helps ensure continued operations and data integrity.

Controlled Physical Access

We control physical access to our facilities and require the same from our data centers. Restricted entry points, biometric authentication, surveillance, and detailed access logs are key parts of our security measures.

Scalability

Our infrastructure scales easily to handle peak traffic and increased demand. Since our founding in 2011, we have gained experience managing high-traffic projects, including during unexpected events.

Internal Security Practices

Principle of Least Privilege

We follow the principle of least privilege as a key part of our security strategy. This means individuals, systems, and processes receive only the minimum level of access necessary to perform their tasks.

Development Principles

Our development principles guide how we build secure and reliable systems. We prioritize security from the start of the software development lifecycle, using practices such as secure coding, code reviews, and manual and automated testing.

Organizational Principles

We promote a culture of accountability, transparency, and continuous improvement across our organization. Our teams follow strict standards for handling your data responsibly. Regular audits, training, and policy reviews support our efforts to maintain a secure environment.

Employee Onboarding and Offboarding

Extensive training and access controls, combined with a careful offboarding process, ensure that only authorized personnel can access sensitive information.

Trusted by:
Zoom
Uber
Pinterest
Samsung
University of Texas