Security Policy
Last updated: July 1, 2025
At Quinetik, protecting your data is a top priority. We follow modern best practices in application security.
1. Infrastructure
- Hosted in secure data centers (AWS)
- Encrypted data at rest and in transit (TLS 1.2+)
- Access controls and audit logs in place
2. Application Security
- Regular code reviews and vulnerability scanning
- Limited access to production systems
- Least privilege access principles
3. Backups & Recovery
- Regular automatic backups
- Disaster recovery plan in place
4. Responsible Disclosure
If you believe you’ve found a security issue, please email contact@quinetik.com. We appreciate responsible disclosure.
5. Compliance
We strive to align with ISO/IEC 27001 and GDPR principles.