Security Policy

Last updated: July 1, 2025

At Quinetik, protecting your data is a top priority. We follow modern best practices in application security.

1. Infrastructure

  • Hosted in secure data centers (AWS)
  • Encrypted data at rest and in transit (TLS 1.2+)
  • Access controls and audit logs in place

2. Application Security

  • Regular code reviews and vulnerability scanning
  • Limited access to production systems
  • Least privilege access principles

3. Backups & Recovery

  • Regular automatic backups
  • Disaster recovery plan in place

4. Responsible Disclosure

If you believe you’ve found a security issue, please email contact@quinetik.com. We appreciate responsible disclosure.

5. Compliance

We strive to align with ISO/IEC 27001 and GDPR principles.