Security Policy
1. Data ProtectionAll data is encrypted in transit using SSL.
2. Access ControlOnly authorized personnel can access user data.
3. MonitoringWe monitor systems to detect suspicious activity.
4. Third-party ServicesWe use trusted providers with strong security standards.
5. Incident ResponseIn case of a breach, users will be notified promptly.
6. User ResponsibilityUsers must protect their login credentials.