Last updated: December 9, 2023
Security is core to our engineering culture. This page outlines the technical and organizational controls we employ to protect your data across our apps, APIs, and infrastructure.
We apply defense‑in‑depth across our stack: encryption in transit and at rest, strict access controls, continuous monitoring, and incident response. Learn more below.
We welcome reports from security researchers. If you believe you’ve found a vulnerability, please contact us with details atsupport@asoasis.tech. Do not publicly disclose without coordinated remediation.
We align our practices with industry best practices and are working toward relevant compliance frameworks appropriate to our scale.
We use reputable cloud providers and third‑party vendors to deliver the Services. Subprocessors are assessed for security posture and bound by DPA obligations.
Contact our security team at support@asoasis.tech. For privacy questions, see our Privacy Policy.