Security
We take the security of your data seriously. This page outlines our security practices, measures, and commitments to protect your information.
Last updated: October 29, 2025
Our Security Commitment
We are committed to protecting the confidentiality, integrity, and availability of your data. We implement industry-standard security measures and continuously monitor and improve our security posture to safeguard your information against unauthorized access, disclosure, alteration, and destruction.
Data Encryption
We use strong encryption to protect your data both in transit and at rest.
Encryption in Transit
- All data transmitted between your device and our servers is encrypted using TLS 1.3
- We enforce HTTPS connections for all web traffic
- API communications are secured with industry-standard encryption protocols
- We use certificate pinning to prevent man-in-the-middle attacks
Encryption at Rest
- All sensitive data is encrypted using AES-256 encryption
- Database encryption is enabled for all production databases
- File storage uses server-side encryption with managed keys
- Backup data is encrypted using the same standards as production data
Key Management
We use industry-standard key management practices including regular key rotation, secure key storage, and separation of duties for key access.
Infrastructure Security
Our infrastructure is designed with security as a fundamental principle.
Cloud Security
- Our services are hosted on enterprise-grade cloud infrastructure
- We utilize multiple availability zones for redundancy and resilience
- Network segmentation isolates sensitive systems
- Regular security assessments and penetration testing are conducted
Access Controls
- Multi-factor authentication (MFA) is required for all administrative access
- Role-based access control (RBAC) limits access based on job function
- Principle of least privilege is enforced across all systems
- Access logs are monitored and retained for security auditing
Network Security
- Firewall protection on all network boundaries
- Intrusion detection and prevention systems (IDS/IPS)
- DDoS protection and mitigation
- Regular vulnerability scanning and remediation
Application Security
We implement security best practices throughout our software development lifecycle.
Secure Development
- Security training for all development team members
- Code reviews with security focus
- Static and dynamic application security testing (SAST/DAST)
- Dependency scanning for known vulnerabilities
- Regular security updates and patch management
Authentication and Authorization
- Strong password requirements with complexity enforcement
- Multi-factor authentication (MFA) available for all users
- Session management with secure timeout policies
- OAuth 2.0 and OpenID Connect for third-party integrations
- API authentication using secure tokens
Input Validation
All user inputs are validated and sanitized to prevent injection attacks, cross-site scripting (XSS), and other common vulnerabilities.
Data Protection
We implement multiple layers of protection to safeguard your data.
Data Classification
- Data is classified based on sensitivity level
- Different security controls applied based on classification
- Personal identifiable information (PII) receives enhanced protection
- Payment data is handled in compliance with PCI DSS standards
Data Minimization
We collect and retain only the data necessary to provide our services. Data is automatically deleted or anonymized when no longer needed.
Backup and Recovery
- Regular automated backups of all critical data
- Geographically distributed backup storage
- Encrypted backup data with secure key management
- Regular disaster recovery testing and drills
- Recovery point objective (RPO) of 24 hours
- Recovery time objective (RTO) of 4 hours for critical systems
Monitoring and Incident Response
We maintain 24/7 security monitoring and have established incident response procedures.
Security Monitoring
- 24/7 security operations center (SOC) monitoring
- Automated alerting for suspicious activities
- Log aggregation and analysis using SIEM tools
- Real-time threat intelligence integration
- Regular security metric reviews and reporting
Incident Response
- Dedicated incident response team
- Documented incident response procedures
- Regular incident response training and simulations
- Notification procedures for affected users
- Post-incident analysis and remediation
Vulnerability Management
We maintain a vulnerability management program that includes regular scanning, prioritization based on risk, and timely remediation of identified vulnerabilities.
Compliance and Certifications
We maintain compliance with relevant security standards and regulations.
Compliance Frameworks
- SOC 2 Type II compliance
- GDPR compliance for data protection
- CCPA compliance for California residents
- ISO 27001 information security management
- PCI DSS for payment card data
Regular Audits
We undergo regular third-party security audits and assessments to validate our security controls and compliance with applicable standards.
Third-Party Security
We carefully evaluate and monitor the security practices of our third-party vendors and partners.
Vendor Assessment
- Security assessments of all third-party vendors
- Contractual security requirements and obligations
- Regular vendor security reviews
- Data processing agreements (DPAs) in place
Subprocessors
We maintain a list of subprocessors who handle data on our behalf. All subprocessors are required to maintain security standards equivalent to ours.
Employee Security
Our employees are trained on security best practices and are subject to security policies.
Security Training
- Mandatory security awareness training for all employees
- Specialized training for technical staff
- Regular phishing simulation exercises
- Ongoing security education and updates
Background Checks
All employees undergo background checks appropriate to their role and access level before being granted access to systems and data.
Acceptable Use Policies
Employees must comply with acceptable use policies governing the use of company resources and handling of sensitive information.
Physical Security
Our data centers and offices maintain strict physical security controls.
Data Center Security
- 24/7 security personnel and surveillance
- Biometric access controls
- Environmental controls (temperature, humidity, fire suppression)
- Redundant power and network connectivity
- Restricted access to authorized personnel only
Office Security
- Access control systems for office premises
- Visitor management and escort policies
- Clean desk and screen lock policies
- Secure disposal of sensitive documents
Responsible Disclosure
We welcome security researchers and the community to report potential security vulnerabilities.
Bug Bounty Program
We maintain a bug bounty program to reward security researchers who responsibly disclose vulnerabilities. Details and scope are available on our security page.
Reporting Security Issues
- Email: security@cooller.net
- PGP key available for encrypted communications
- Response within 24 hours for critical issues
- Regular updates on investigation and remediation
Responsible Disclosure Guidelines
- Provide detailed information about the vulnerability
- Allow reasonable time for remediation before public disclosure
- Do not access or modify data belonging to others
- Do not perform actions that could harm service availability
Your Security Responsibilities
Security is a shared responsibility. We encourage you to take the following steps to protect your account:
Best Practices
- Use strong, unique passwords for your account
- Enable multi-factor authentication (MFA)
- Keep your contact information up to date
- Do not share your account credentials with others
- Log out when using shared or public computers
- Keep your devices and software up to date
- Be cautious of phishing attempts
- Report suspicious activity immediately
Contact Us
If you have questions about our security practices or need to report a security concern, please contact us:
Security Contact
- Email: security@cooller.net
- Security Issues: security-reports@cooller.net
- Emergency Contact: Available 24/7 for critical issues
- PGP Public Key: Available at security@cooller.net/pgp
If you have any questions about this document, please contact us at legal@cooller.net

