Security Policy
Last updated: 01.01.2026
1. Our approach to security
We treat the protection of user data as our highest priority. Our security policy is based on the principles of confidentiality, integrity, and availability of data. We follow industry best practices and regularly update our security systems.
2. Infrastructure security measures
2.1. Protection of data in transit:
- SSL certificates from trusted certification authorities
2.2. Protection of data at rest:
- Regular backup of data to geographically distributed data centers
2.3. Protection against attacks:
- Multi-layered protection against DDoS attacks
- Web Application Firewall (WAF) for protection against web attacks
3. Authentication and access
- Multi-factor authentication for administrative access
- Strong password requirements for users
- Regular rotation of access keys and certificates
- Principle of minimal privileges for all employees
- Audit logging of all critical operations
4. Monitoring and audit
- Continuous monitoring of security systems
- Annual penetration testing
- Automatic vulnerability scanning
- Real-time threat monitoring
5. Notification of security incidents
In accordance with GDPR requirements and other regulations:
- We notify users of data breaches within 72 hours of discovery
- We provide full information about the nature of the incident
- We report on measures taken to eliminate the threat
- We give recommendations for protecting your data
6. Training and awareness
- Regular training of employees on security issues
- Programs to raise awareness of phishing and social engineering
- Internal policies and procedures for handling confidential data
7. Responsibility and compliance
- Compliance with GDPR, ISO 27001, SOC 2 requirements
- Regular compliance checks against regulatory requirements
8. Recommendations for users
To improve your own security, we recommend:
- Using unique and complex passwords
- Enabling two-factor authentication if available
- Regular software updates
- Being vigilant about phishing emails
- Using antivirus software
9. Contact information
To report a security vulnerability or to obtain information about our security policy:
Email: [email protected]