Data protection
- Encryption in transit (TLS) and encryption at rest where supported.
- Access controls with least-privilege principles.
- Defined retention and deletion workflows.
We operate a security and privacy baseline built for enterprise and big tech expectations: compliance programs, audit-ready evidence, and production workflows.
To report a vulnerability, contact security@certifyops.com. We investigate reports and coordinate mitigation updates based on severity.
See also Privacy Policy and Terms.