Data Protection Policy

Ways of resolving code vulnerabilities identified during development and at runtime


We have a runbook for detecting and correcting vulnerabilities. We are able to protect against technical hardware vulnerabilities containing PII by performing vulnerability analyses and making appropriate fixes.

We perform vulnerability analysis and penetration testing every 180 days, and perform code analysis to detect vulnerabilities before the release of each version.

We control changes to storage hardware by testing, verifying and approving all changes and by restricting access to those who can perform such actions.