We care deeply about data privacy and security and strive to keep our security practices industry-leading. We follow these practices:
- Using encryption technologies to protect customer data both at rest and in transit
- Performing regular vulnerability scans over the system, application, infrastructure source code, dependencies, container images, and network
- Using intrusion detection systems to prevent and identify potential security attacks from users outside the boundaries of the system
- Following the principle of least privilege for employee access to the services.