Your Data Security is Our Priority
We implement industry-leading security practices to protect your images, data, and business. Here's how we keep everything safe.
Security at Every Layer
End-to-End Encryption
All data is encrypted using TLS 1.3 in transit and AES-256 at rest.
SOC 2 Type II Infrastructure
Our infrastructure providers (Supabase, Vercel) maintain SOC 2 Type II compliance.
Secure Authentication
Passwords hashed with bcrypt, optional 2FA, and OAuth integration.
24/7 Monitoring
Continuous security monitoring with automated threat detection.
DDoS Protection
Enterprise-grade DDoS mitigation powered by Vercel and Cloudflare.
Regular Audits
Periodic security assessments and penetration testing.
All Systems Operational
No security incidents in the past 90 days
Security Practices
Data Protection
- All customer data encrypted at rest using AES-256
- Encryption in transit via TLS 1.3
- Database backups encrypted and geo-redundant
- Automatic data retention policies
- Secure deletion upon account termination
Access Control
- Role-based access control (RBAC)
- Principle of least privilege for all team members
- Multi-factor authentication for admin access
- Detailed audit logs of all access
- Automatic session timeout
Application Security
- OWASP Top 10 vulnerability protection
- SQL injection and XSS prevention
- CSRF protection on all forms
- Rate limiting on all API endpoints
- Input validation and sanitization
Infrastructure
- Serverless architecture reduces attack surface
- Automatic security patches and updates
- Network isolation and firewalls
- Container security scanning
- No direct database access from internet
Compliance & Certifications
Responsible Disclosure
We take security vulnerabilities seriously. If you discover a potential security issue, please report it responsibly. We appreciate your help in keeping Jewelshot safe for everyone.
Report a vulnerability→How We Handle Your Images
Upload
Your images are uploaded over an encrypted connection (TLS 1.3) and stored temporarily in our secure processing queue.
Processing
Images are processed by our AI in isolated environments. No human reviews your images unless you request support.
Storage
Generated images are stored in your personal gallery, encrypted at rest. Original uploads are deleted after processing unless you choose to keep them.
Deletion
You can delete any image at any time. When deleted, images are immediately removed from our active systems and purged from backups within 30 days.
Security Questions?
Our security team is here to help with any concerns.
Contact Security Team