Last updated: 2025-10-31
We follow a risk-based security model with least-privilege access, defense-in-depth and secure-by-default configuration.
We investigate security incidents, limit impact, and notify affected customers as required by law.