Security Policy

Last updated: February 12, 2026

1. Encryption

2. Authentication

3. Infrastructure Security

4. Data Isolation

5. Incident Response

6. Vulnerability Disclosure

7. Data Retention

8. Third-Party Services

9. Security Disclaimer

10. Contact