Security

Security & Compliance

Effective date: November 19, 2022. A high-level overview of security practices at Remote Fort B.V..

Overview

Effective date: November 19, 2022 Protecting customer information and confidential business data is a top priority for us. We design our Service with security in mind and continuously improve our controls as threats evolve. This page provides a high-level overview of our security and compliance practices. It is not a guarantee of any specific outcome and does not replace contractual commitments agreed in an Order Form.

Compliance and privacy standards

We maintain a security and privacy program designed to support common regulatory and customer expectations. Depending on your plan and use case, this may include support for privacy requirements (such as GDPR-aligned practices) and security controls expected for enterprise buyers. Where we rely on third-party providers (e.g., cloud infrastructure), we select vendors that maintain widely recognized assurance reports and certifications.

Encryption

We use encryption in transit and at rest where appropriate. Network traffic is protected using modern TLS configurations. Stored data is protected using encryption mechanisms provided by trusted infrastructure providers and industry-standard key management practices. We also apply additional safeguards for secrets and access tokens, such as scoped permissions and secure storage.

Consent and user control

We aim to support consent- and control-oriented privacy principles. Where applicable, users and customers can manage settings and preferences, and customers can request assistance for privacy-related inquiries through support.

Continuous improvement

Security is an ongoing process. We routinely evaluate risks, review controls, implement improvements, and validate security assumptions through testing and monitoring. Our security practices evolve to address new threats, new product capabilities, and changing customer requirements.

Data retention and deletion

We retain data only for as long as necessary to provide the Service, meet contractual obligations, and comply with applicable laws. Retention periods may vary depending on the type of data and the customer relationship. If you need assistance with data deletion requests or export needs, contact our support team.

Infrastructure and secure operations

Our Service is hosted on reputable cloud infrastructure. We use layered security controls such as network segmentation, access controls, logging, and monitoring. We aim to minimize the attack surface by following least-privilege access practices and routinely reviewing operational access.

Secure development

We maintain secure development practices designed to reduce vulnerabilities, including: - Secure SDLC practices and peer review - Developer security training and awareness - Use of automated testing where appropriate (e.g., dependency scanning, static analysis) - Regular updates to dependencies and infrastructure - Periodic security testing and review processes The scope and frequency of specific checks may vary over time and by product area.

Monitoring and incident response

We operate monitoring and alerting to help detect anomalous activity and service issues. We maintain procedures for triage and incident response, including communication workflows appropriate to the severity and nature of an event.

Responsible disclosure

If you believe you have discovered a security vulnerability, please contact us at: security@remotefort.com Please include a clear description and, if possible, steps to reproduce or a proof of concept. Please avoid automated scanning that may impact other users, test only with data you are authorized to use, and do not publicly disclose details until we have had an opportunity to investigate.

General information security principles

Our security program is designed around common principles: - Confidentiality: prevent unauthorized disclosure of information - Integrity: protect information from unauthorized modification - Availability: ensure authorized access when needed We also promote security awareness internally and encourage employees to report security concerns through established channels.

Contact

Security: security@remotefort.com Support: support@remotefort.com