Our security strategy involves multiple layers to protect sensitive information. Utilizing government level encryption, robust network boundaries, access controls including role driven access, and other best practices, we are working to ensure data is protected at rest and in transmission.
Security threats change constantly, so we are always evaluating and evolving our system and processes for improvements and vulnerabilities.
When we talk about transparent managed security, it includes being transparent about the open source software we use to deliver our service. Read more.
We do not share or sell personal information with any third-party organizations. Read our full policy here.