Skip to content

Trust Center

Security, privacy, and operational handling standards

This page outlines core controls, data handling practices, and support expectations for site visitors and partners.

Application Security

  • Security headers are enforced at the platform edge.
  • Rate limiting is applied to contact and analytics ingestion endpoints.
  • Request IDs and structured logs are emitted for traceability and incident response.

Data Handling

  • Contact submissions are used only for business communication and follow-up.
  • Analytics collection is consent-aware and minimized to operational signal.
  • No personal data is sold or shared for advertising brokerage.

Operational Reliability

  • Health and metrics endpoints support uptime checks and production monitoring.
  • Synthetic checks validate key availability and contact-path behavior.
  • Kubernetes deployment uses readiness/liveness probes with autoscaling and disruption controls.

Contact SLA

Security inquiry acknowledgement

Within 1 business day

Initial triage and severity classification

Within 2 business days

Status update cadence for active issues

At least every 3 business days

Privacy and Reporting

For privacy details, review the policy page. For security or data handling requests, use the contact form and select the most relevant inquiry type.

Let's Build

Need enterprise-specific security documentation?

Share your requirements and we can provide additional detail during the engagement discovery process.