Security

Security controls designed to protect uploads, account data, and analysis results.

Encryption

  • All traffic is protected using TLS in transit.
  • Stored files and logs are encrypted at rest.
  • Encryption keys are rotated on a scheduled basis.

Access Controls

  • Role-based access policies limit internal data access.
  • Administrative actions are audited and monitored.
  • Multi-factor authentication is enforced for privileged users.

Infrastructure Security

  • Continuous vulnerability scanning of systems and dependencies.
  • Network segmentation and managed perimeter controls.
  • Automated backup and recovery routines.

Incident Response

  • 24/7 monitoring for service and security anomalies.
  • Documented response runbooks with severity escalation.
  • Affected customers are notified after confirmed incidents.

Vulnerability Disclosure

Report suspected vulnerabilities to security@forensiclens.ai. We acknowledge reports promptly and coordinate remediation updates.

Compliance

We maintain controls aligned with SOC 2 readiness practices and privacy laws applicable to our customers.