We use software best practices to guarantee that only people who you designate as viewers of your data can access it. In other words, we segment our user data via software. We do our best and are very confident we're doing a good job at it, but, like every other service that hosts their user data on the same database, we cannot guarantee that it is immune to a sophisticated attack.
Previous Status: PENDING
Updated Status: DECLINED
Title: Information is provided about security practices
Analysis: Generated through the annotate view
Status: PENDING