Security

Encryption

TLS 1.2+ in transit, AES‑256 at rest, and key rotation.

Least-Privilege Access

Strict role-based access for systems and staff.

Operational Controls

Backups, monitoring, and change reviews inspired by SOC 2.

Data Deletion

Clear retention limits and verified deletion on request.