Security Practices
Last updated: Dec 18, 2025
Security overview
How iCollector protects your data.
Security is built into our product and operations. We use layered controls to protect data, including encryption, access restrictions, and continuous monitoring.
Owners control workspace permissions and billing access. Admins manage members and roles.
Data protection
Encryption in transit and at rest.
- HTTPS/TLS is required for all connections.
- Passwords are stored using secure hashing.
- Stored data and backups are protected with industry standard encryption.
Access controls
Least privilege and strong authentication.
- Role based access with owner, admin, member, and viewer roles.
- Single active session per user with 24 hour expiry.
- Two factor authentication on every login.
Monitoring and response
Detect and respond to security events.
We monitor system health and security events, and investigate suspicious activity. Incidents are triaged and resolved using documented response procedures.
Customer responsibilities
Shared responsibility model.
Customers are responsible for managing workspace access, reviewing permissions, and securing their own devices and networks.
Vulnerability reporting
Responsible disclosure.