Privacy and control features
Custom control users’ access to features based on privacy settings. Configure your privacy settings quickly and easily with simple UI controls.
Encryption is implemented when data is in transit or at rest over public networks and in our databases
Databases have multi-layer security including encrypted passwords, two factor authentication, intrusion detection systems, and VPC with strict firewall settings.
A certified third party consultant conducts annual penetration tests.
Internal and external audits
Audits are carried out regularly to review access control, risk, information security, IT infrastructure, and HR procedures.
Frequent data backup with a maximum 24-hour Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
Ensure rigor with employees
All of our employees must complete regular security training on industry best practices with regular third-party audits.
Our computers, databases and applications are run against a program regularly to check for weaknesses.