Enterprise‑minded practices to keep your data safe by default.
Security is built into our product and operations: least‑privilege access, encrypted data flows, continuous monitoring, and vendor due diligence.
Role‑based access, SSO support (on request), audit trails, and annual access reviews. Production access is limited and logged.
We follow SOC‑2 minded practices. Data is hosted with reputable cloud providers with robust certifications.
We maintain an incident runbook with triage, escalation, communication, and post‑mortem. Customers are notified per legal requirements.
Report vulnerabilities to security@usezact.com. Please include steps to reproduce. We will acknowledge and remediate promptly.
Security questions? security@usezact.com