This Security Policy describes the baseline security practices, incident handling approach, and responsible disclosure path for . It is designed for a production web application that stores user accounts, uploaded PDFs, project metadata, and generated output files.
Reasonable safeguards • Role-based access • Incident response
Our objective is to protect the confidentiality, integrity, and availability of systems and information by using measures appropriate to the sensitivity of the information and the risks presented by the service.
User-uploaded files may include PDFs and metadata entered by users. Access to those materials should be restricted by account and role. Files should not be exposed by raw public directory browsing unless intentionally configured. Users are responsible for ensuring they have rights to upload and process the content they submit.
We aim to retain production records only for as long as reasonably necessary for service delivery, support, compliance, dispute resolution, backup cycles, and business continuity. Temporary work files and intermediate processing artifacts should be subject to shorter retention and periodic cleanup. When records are disposed, we aim to use methods appropriate to the storage medium and operational environment.
When we become aware of a suspected security incident, we aim to investigate, contain, assess impact, preserve evidence where appropriate, remediate, and notify affected parties or authorities where required by law, contract, or the circumstances of the incident.
If you believe you have found a security issue, please report it to . Please include a detailed description, affected URLs or functionality, reproduction steps, proof of concept if appropriate, and a contact method. Do not exploit vulnerabilities, access data you do not own, degrade service availability, or publicly disclose an issue before we have had a reasonable opportunity to investigate and remediate.
We may rely on hosting providers, email providers, backup providers, analytics tools, and other service providers. Where they process information on our behalf, we aim to use contractual restrictions and appropriate diligence for the scope and risk of the service relationship.
We aim to maintain backups, operational recovery procedures, and troubleshooting practices appropriate to the service environment. Availability is not guaranteed, and maintenance windows, outages, and incidents may affect access from time to time.
Security contact:
Legal or privacy contact:
Mailing address:
We may update this Security Policy from time to time to reflect changes in the service, risk profile, or legal requirements. Material changes will be reflected by updating the effective date.