Security Statement

Last Updated: March 28, 2025

Our Commitment to Security

At ClearCodes LLC ("ClearCodes"), we understand the importance of security and the protection of your data. We are committed to implementing and maintaining robust security measures to safeguard your information. This Security Statement outlines our approach to security and the measures we take to protect your data.

While we implement comprehensive security practices and continuously monitor and improve our systems, we acknowledge that no system is perfect. We strive for excellence in our security practices but cannot guarantee absolute perfection. Our commitment is to do everything reasonably within our power to protect your data and to respond promptly and effectively to any security incidents.

Security Governance

Our security program is built on industry best practices and frameworks. We have established:

  • Regular security assessments and audits to identify and address potential vulnerabilities
  • Comprehensive security policies and procedures that are regularly reviewed and updated
  • Security awareness training for all employees
  • Incident response plans to address security events promptly and effectively

Data Protection Measures

We employ multiple layers of protection to safeguard your data:

Encryption

We encrypt sensitive data both in transit and at rest:

  • All data transmitted between your browser and our servers is encrypted using TLS (Transport Layer Security)
  • Sensitive data stored in our databases is encrypted using industry-standard encryption algorithms
  • Encryption keys are securely managed and rotated regularly

Access Controls

We implement strict access controls to ensure that only authorized individuals can access your data:

  • Role-based access control (RBAC) to limit access to specific data and functionality
  • Multi-factor authentication (MFA) for administrative access
  • Principle of least privilege to ensure employees have only the access necessary for their job functions
  • Regular access reviews to verify that access rights remain appropriate
  • Secure authentication mechanisms for user accounts

Infrastructure Security

Our infrastructure is designed with security in mind:

  • Secure cloud infrastructure with industry-leading providers
  • Network segmentation to isolate sensitive systems
  • Firewalls and intrusion detection/prevention systems
  • Regular security patching and updates
  • Continuous monitoring for suspicious activities
  • Redundant systems to ensure availability

Application Security

We follow secure development practices:

  • Secure coding guidelines and training for developers
  • Regular code reviews and static code analysis
  • Vulnerability scanning and penetration testing
  • Security testing throughout the development lifecycle
  • Dependency management to address known vulnerabilities in third-party components

Monitoring and Incident Response

We maintain vigilance through:

  • 24/7 monitoring of our systems and applications
  • Automated alerts for suspicious activities or anomalies
  • Logging and audit trails to track system activities
  • A defined incident response process to address security events
  • Regular testing of our incident response procedures

In the event of a security incident that affects your data, we will:

  • Promptly investigate and contain the incident
  • Assess the impact and determine affected data
  • Notify affected users in accordance with applicable laws and regulations
  • Work to remediate the issue and prevent similar incidents in the future
  • Cooperate with law enforcement and regulatory authorities as necessary

Compliance and Certifications

We are committed to complying with relevant security standards and regulations:

  • Regular security assessments and audits
  • Compliance with applicable data protection regulations
  • Vendor security assessments to ensure our partners maintain appropriate security controls

Continuous Improvement

Security is an ongoing process, not a one-time effort. We are committed to continuously improving our security posture through:

  • Regular review and updates to our security policies and procedures
  • Staying informed about emerging threats and vulnerabilities
  • Incorporating lessons learned from security incidents and near-misses
  • Investing in new security technologies and approaches
  • Ongoing security training and awareness for our team

Your Role in Security

Security is a shared responsibility. You can help protect your account and data by:

  • Using strong, unique passwords for your ClearCodes account
  • Enabling multi-factor authentication when available
  • Being cautious about phishing attempts and suspicious communications
  • Keeping your devices and software up to date
  • Logging out of your account when using shared devices
  • Promptly reporting any suspicious activities or potential security incidents

Reporting Security Concerns

If you discover a security vulnerability or have concerns about the security of our services, please contact us immediately at legal@clearcodes.ai. We take all security reports seriously and will investigate promptly.

Updates to This Statement

We may update this Security Statement from time to time to reflect changes in our security practices or for other operational, legal, or regulatory reasons. We will post the revised statement on our website with an updated revision date.

Contact Information

If you have any questions about our security practices, please contact us at:

ClearCodes LLC
Email: legal@clearcodes.ai