Security Policy
Last updated: March 3, 2023
At Etch1, we are committed to ensuring the security of your data and maintaining a trustworthy platform. This Security Policy outlines our practices and measures to protect your information.
Data Security Measures
We implement and maintain the following security measures:
- Encryption of data in transit using HTTPS/TLS
- Regular security assessments and penetration testing
- Secure access controls and authentication mechanisms
- Regular security patches and updates
- Data backups and disaster recovery procedures
Infrastructure Security
Our infrastructure is designed with security as a priority:
- Cloud hosting with industry-leading security practices
- Network security including firewalls and intrusion detection
- Regular monitoring and logging of system activities
- Redundancy and failover mechanisms to ensure availability
Access Control
We maintain strict access controls to protect your data:
- Role-based access control for all internal systems
- Multi-factor authentication for administrative access
- Regular access reviews and least privilege principles
- Secure employee onboarding and offboarding procedures
Incident Response
In the event of a security incident:
- We maintain a formal incident response plan
- Our team is trained to identify and respond to security threats
- We will notify affected users in accordance with applicable laws
- We conduct post-incident reviews to improve our security measures
Vulnerability Management
Our approach to vulnerability management includes:
- Regular vulnerability scanning of our systems and applications
- A responsible disclosure program for security researchers
- Timely remediation of identified vulnerabilities
- Monitoring of security advisories and updates
Reporting Security Concerns
If you discover a security vulnerability or have concerns about our security practices, please contact us immediately at [email protected]. We take all security reports seriously and will respond promptly.
Updates to This Policy
We may update this Security Policy from time to time to reflect changes in our practices or for other operational, legal, or regulatory reasons. We encourage you to periodically review this page for the latest information on our security practices.