We use software best practices to guarantee that only people who you designate as viewers of your data can access it. In other words, we segment our user data via software. We do our best and are very confident we're doing a good job at it, but, like every other service that hosts their user data on the same database, we cannot guarantee that it is immune to a sophisticated attack.
Previous Title: No changes recorded
Updated Title: No changes recorded
Previous Analysis: No changes recorded
Updated Analysis: No changes recorded
Previous Status: PENDING
Updated Status: DECLINED
Previous Title:
Updated Title: Information is provided about security practices
Previous Analysis:
Updated Analysis: Generated through the annotate view
Previous Status:
Updated Status: PENDING