Security Policy

Last updated: May 22, 2025

1. Data Protection

All user data is encrypted both in transit (using HTTPS/TLS) and at rest. We follow industry best practices to secure user credentials, tokens, and all sensitive data.

2. Access Control

Access to systems and data is restricted to authorized personnel only. Internal access is monitored and controlled based on roles and responsibilities.

3. Infrastructure & Hosting

Our services are hosted on modern, secure cloud infrastructure. We use trusted providers that comply with global standards in data security and redundancy.

4. Incident Response

In the event of a data breach or security incident, we will take immediate steps to investigate, mitigate, and notify affected users as required.

5. Third-Party Integrations

Any third-party integrations (like Slack, Gmail, or Jira) are authenticated securely, and only minimal credentials are stored, encrypted, and used strictly within user-defined workflows.

6. Contact & Reporting

If you identify a potential vulnerability or have questions regarding our security practices, please contact us at qai.app.co@gmail.com.

© 2025. All rights reserved.