Security Policy

Last updated: January 8, 2026

1. Our Commitment to Security

At Tinyloop, we take security seriously. We implement comprehensive security measures to protect your data, systems, and infrastructure from unauthorized access, disclosure, alteration, or destruction.

2. Data Protection

2.1 Encryption

  • All data in transit is encrypted using TLS 1.2 or higher
  • Data at rest is encrypted using industry-standard encryption algorithms
  • Sensitive information is encrypted with additional layers of protection

2.2 Access Controls

  • Multi-factor authentication for all administrative accounts
  • Role-based access control with principle of least privilege
  • Regular access reviews and credential rotation
  • Audit logs for all system access and changes

3. Infrastructure Security

3.1 Network Security

  • Firewalls and intrusion detection systems
  • Regular security monitoring and threat detection
  • DDoS protection and mitigation
  • Network segmentation and isolation

3.2 Server Security

  • Regular security updates and patches
  • Hardened server configurations
  • Vulnerability scanning and penetration testing
  • Secure configuration management

4. Application Security

  • Secure coding practices and code reviews
  • Automated security testing in CI/CD pipelines
  • Input validation and output encoding
  • Protection against common vulnerabilities (OWASP Top 10)

5. Data Storage and Backup

  • Redundant data storage with geographic distribution
  • Regular automated backups with verified restore procedures
  • Backup encryption and secure storage
  • Disaster recovery planning and testing

6. Compliance and Certifications

We strive to maintain compliance with relevant security standards and regulations, including:

  • GDPR (General Data Protection Regulation)
  • CCPA (California Consumer Privacy Act)
  • SOC 2 Type II (in progress)
  • Industry best practices and frameworks

7. Incident Response

We maintain an incident response plan to address security incidents promptly and effectively. Our process includes:

  • Immediate containment and assessment
  • Investigation and root cause analysis
  • Notification of affected users when required by law
  • Remediation and prevention measures
  • Post-incident review and improvements

8. Third-Party Security

We carefully vet all third-party service providers and vendors. We require them to maintain appropriate security standards and regularly assess their security practices.

9. Employee Security

  • Background checks for all employees
  • Security training and awareness programs
  • Confidentiality agreements and security policies
  • Regular security updates and communication

10. Security Reporting

If you discover a security vulnerability, please report it responsibly to security@tinyloop.co. We appreciate your help in keeping our Service secure and will respond promptly to all security reports.

11. Continuous Improvement

Security is an ongoing process. We regularly review and update our security practices, conduct security assessments, and stay informed about emerging threats and best practices.

12. Contact Us

For security-related questions or concerns, please contact us at security@tinyloop.co.