Data Privacy
We ensure that we never collect more data than we need, protect all personal information, and secure everything that could be considered sensitive. As a company, we designed privacy, security, and access control into every aspect of our product and software, down to the infrastructure that powers it all.
Here are a few of the core principles behind how we secure your data:
- Source code protection: we never read, transmit, or store source code and never edit or modify code or files. We collect only metadata.
- Data encryption: we encrypt all data at rest in databases, backups, and storage.
- SOC 2 compliant: We are SOC 2 Type 2 compliant and monitor our security posture on an ongoing basis.
You can also access our Security Policy and Privacy Policy on our website.