Login

Security Policy

We take security seriously

1. Data Protection
All data is encrypted in transit using SSL.

2. Access Control
Only authorized personnel can access user data.

3. Monitoring
We monitor systems to detect suspicious activity.

 

4. Third-party Services
We use trusted providers with strong security standards.

5. Incident Response
In case of a breach, users will be notified promptly.

6. User Responsibility
Users must protect their login credentials.