Security

Security Practices

Last updated: Dec 18, 2025

Security overview

How iCollector protects your data.

Security is built into our product and operations. We use layered controls to protect data, including encryption, access restrictions, and continuous monitoring.

Owners control workspace permissions and billing access. Admins manage members and roles.

Data protection

Encryption in transit and at rest.

  • HTTPS/TLS is required for all connections.
  • Passwords are stored using secure hashing.
  • Stored data and backups are protected with industry standard encryption.

Access controls

Least privilege and strong authentication.

  • Role based access with owner, admin, member, and viewer roles.
  • Single active session per user with 24 hour expiry.
  • Two factor authentication on every login.

Monitoring and response

Detect and respond to security events.

We monitor system health and security events, and investigate suspicious activity. Incidents are triaged and resolved using documented response procedures.

Customer responsibilities

Shared responsibility model.

Customers are responsible for managing workspace access, reviewing permissions, and securing their own devices and networks.

Vulnerability reporting

Responsible disclosure.

Email: support@icollector.ai

We review reports and coordinate fixes with priority.