← Back to home Open app

Security Policy

• Effective date:

This Security Policy describes the baseline security practices, incident handling approach, and responsible disclosure path for . It is designed for a production web application that stores user accounts, uploaded PDFs, project metadata, and generated output files.

Reasonable safeguards • Role-based access • Incident response

1. Security objectives

Our objective is to protect the confidentiality, integrity, and availability of systems and information by using measures appropriate to the sensitivity of the information and the risks presented by the service.

Administrative safeguards

  • Role-based permissions for administrative functions.
  • Session-based access control and user separation.
  • Change management and configuration control for production systems.
  • Access limited to personnel and contractors with a legitimate business need.

Technical safeguards

  • Authentication controls and password handling appropriate to the environment.
  • Secure transport where supported and configured (for example, HTTPS/TLS in deployment).
  • Logging, error monitoring, and security event review appropriate to the service.
  • Input handling, permissions checks, and server-side processing controls designed to reduce abuse.

2. Uploaded files and user content

User-uploaded files may include PDFs and metadata entered by users. Access to those materials should be restricted by account and role. Files should not be exposed by raw public directory browsing unless intentionally configured. Users are responsible for ensuring they have rights to upload and process the content they submit.

3. Retention, deletion, and disposal

We aim to retain production records only for as long as reasonably necessary for service delivery, support, compliance, dispute resolution, backup cycles, and business continuity. Temporary work files and intermediate processing artifacts should be subject to shorter retention and periodic cleanup. When records are disposed, we aim to use methods appropriate to the storage medium and operational environment.

4. Incident response and breach handling

When we become aware of a suspected security incident, we aim to investigate, contain, assess impact, preserve evidence where appropriate, remediate, and notify affected parties or authorities where required by law, contract, or the circumstances of the incident.

5. Responsible disclosure

If you believe you have found a security issue, please report it to . Please include a detailed description, affected URLs or functionality, reproduction steps, proof of concept if appropriate, and a contact method. Do not exploit vulnerabilities, access data you do not own, degrade service availability, or publicly disclose an issue before we have had a reasonable opportunity to investigate and remediate.

6. Third parties and subprocessors

We may rely on hosting providers, email providers, backup providers, analytics tools, and other service providers. Where they process information on our behalf, we aim to use contractual restrictions and appropriate diligence for the scope and risk of the service relationship.

7. Business continuity

We aim to maintain backups, operational recovery procedures, and troubleshooting practices appropriate to the service environment. Availability is not guaranteed, and maintenance windows, outages, and incidents may affect access from time to time.

8. Contact

Security contact:
Legal or privacy contact:
Mailing address:

9. Policy changes

We may update this Security Policy from time to time to reflect changes in the service, risk profile, or legal requirements. Material changes will be reflected by updating the effective date.