Last updated: [add date]
We prioritise the security of user data and platform operations.
1. Technical Protections
We use:
-
SSL encryption
-
Firewall and DDoS protection
-
Encrypted backups
-
Role-based access controls
-
Regular software patching
2. Monitoring
We monitor for:
-
Unusual login behaviour
-
Spam bots
-
Suspicious IPs
-
High-volume scraping
3. Data Protection
Personal data is encrypted at rest and in transit.
Only authorised personnel may access user data.
4. Incident Response
Security incidents are handled under a 4-step process:
-
Identification
-
Containment
-
Resolution
-
Notification (including to users if required)
5. User Responsibilities
Users must:
-
Protect their passwords
-
Avoid sharing login credentials
-
Report suspicious activity immediately
