We take security seriously. Here's how we protect your data.
All data in transit is encrypted using TLS 1.2+. Data at rest is encrypted using AES-256. We use industry-standard encryption protocols to ensure your information is secure.
We implement role-based access control (RBAC) and the principle of least privilege. Users only have access to the data they need for their role. Admin access is restricted and logged.
We maintain automated daily backups with redundancy across multiple geographic locations. Recovery time objective (RTO) is less than 4 hours. We test backups regularly to ensure data integrity.
All access and changes are logged and monitored. We use automated alerting for suspicious activity. Logs are retained for 90 days and archived for compliance.
We carefully vet all third-party vendors and service providers. All integrations are reviewed for security. We maintain data processing agreements (DPAs) with all vendors.
If you discover a security vulnerability, please email security@815.media with details. We take all reports seriously and will respond within 24 hours.
For security questions or to request our security documentation, contact support@815.media