Security philosophy
- Risk reduction through layered controls and least-privilege access.
- Operational visibility through logging and auditability.
- Continuous improvement based on internal reviews and external feedback.
Tenant isolation (conceptual)
- Customer data is logically separated by tenant boundaries.
- Access is scoped to authorized users and approved use cases.
- Administrative access is limited and monitored.
Encryption approach (high-level)
- Encryption in transit is used for data exchanged with the platform.
- Encryption at rest is used for stored data.
- Key management practices are applied to limit access to sensitive material.
Governance and compliance scope
- Security is principle-based and risk-driven, with layered controls.
- Tenant isolation is a logical separation concept; detailed mechanisms are not public.
- Encryption in transit and at rest is used for platform data.
- This public page does not claim SOC 2, ISO 27001, PCI DSS, or HIPAA certification.
Responsible disclosure
We welcome responsible security reports. Our disclosure process is published at /.well-known/security.txt.
Contact: support@icollector.ai
Explicit non-guarantees
- This page does not guarantee the absence of vulnerabilities.
- Submission of a report does not guarantee a bounty or specific response timeline.
- Public details are intentionally limited to avoid exposing sensitive information.