Security & Privacy
Your data security is our top priority. Learn about the comprehensive security measures we implement to protect your financial information.
Our Security Commitment
Bank-Level Security
We use the same security standards as major financial institutions to protect your data.
Privacy First
We never sell your data and only collect what's necessary to provide our services.
Continuous Monitoring
Our security team monitors our systems 24/7 to detect and prevent threats.
Security Measures
Data Encryption
- End-to-end encryption for all data in transit
- AES-256 encryption for data at rest
- TLS 1.3 for all communications
- Encrypted database connections
Authentication & Access
- OAuth 2.0 integration with Google and GitHub
- Session-based authentication with secure tokens
- Multi-factor authentication support
- Regular security token rotation
Infrastructure Security
- Secure cloud hosting with enterprise-grade security
- Regular security updates and patches
- Network-level firewalls and DDoS protection
- 24/7 security monitoring and alerting
Data Protection
- GDPR and CCPA compliance
- Data minimization principles
- Regular security audits and assessments
- Secure data backup and recovery procedures
Application Security
- Input validation and sanitization
- SQL injection prevention
- Cross-site scripting (XSS) protection
- Regular security code reviews
Monitoring & Incident Response
- Real-time security monitoring
- Automated threat detection
- Incident response procedures
- Regular penetration testing
Compliance & Certifications
GDPR
General Data Protection Regulation compliance for EU users
CCPA
California Consumer Privacy Act compliance
SOC 2 Type II
Security, availability, and confidentiality controls
ISO 27001
Information security management system
What We Collect
- • Account information (name, email from OAuth providers)
- • Portfolio data (stock positions, purchase details)
- • Investment goals and preferences
- • Usage analytics (anonymized)
- • Technical logs for security monitoring
What We Never Collect
- • Social Security Numbers
- • Bank account details
- • Credit card information
- • Personal identification documents
- • Sensitive personal information
Security Incident Response
Our Process
- 1Immediate detection and assessment of security incidents
- 2Containment and mitigation of the threat
- 3Investigation and root cause analysis
- 4Notification of affected users if necessary
- 5Implementation of preventive measures
Report Security Issues
If you discover a security vulnerability or have concerns about our security practices, please report it to us immediately.
We take all security reports seriously and will respond within 24 hours.
Questions About Security?
Our security team is available to answer any questions about our security practices and data protection measures.