Data Security

Last Updated: October 12, 2025

Our Commitment to Security

At Renoz, we take the security of your data seriously. This page outlines the technical and organizational measures we implement to protect your personal information and business data. While no system can guarantee absolute security, we continuously work to maintain industry-standard security practices.

1. Data Encryption

Encryption in Transit

All data transmitted between your device and our servers is encrypted using TLS/SSL (Transport Layer Security) with a minimum of TLS 1.2. This protects your data from interception during transmission.

Encryption at Rest

Sensitive data stored in our databases is encrypted at rest using AES-256 encryption. This includes passwords, payment information, and other sensitive personal information.

Password Security

User passwords are never stored in plain text. We use industry-standard bcrypt hashing with salt to protect your password. Even our administrators cannot access your password.

2. Infrastructure Security

Cloud Infrastructure

Our services are hosted on enterprise-grade cloud infrastructure:

  • Supabase: Enterprise PostgreSQL hosting with automatic backups and high availability
  • Vercel: Global edge network with DDoS protection and automatic scaling
  • AWS (via Supabase): Data centers with physical security, redundant power, and network connectivity

Network Security

  • Firewalls to control traffic and prevent unauthorized access
  • DDoS protection to maintain service availability
  • Intrusion detection and prevention systems
  • Regular security patches and updates
  • Network segmentation to isolate sensitive systems

Data Backups

  • Automated daily backups of all user data
  • Geographic redundancy across multiple data centers
  • Point-in-time recovery capabilities
  • Regular backup testing and verification
  • Encrypted backup storage

3. Application Security

Authentication & Authorization

  • Multi-factor authentication support (OAuth with Google)
  • Session management with automatic timeout
  • Role-based access control (RBAC)
  • Secure password requirements (minimum 6 characters)
  • Account lockout after multiple failed login attempts

Security Best Practices

  • Protection against SQL injection attacks
  • Cross-Site Scripting (XSS) prevention
  • Cross-Site Request Forgery (CSRF) protection
  • Input validation and sanitization
  • Secure API endpoints with rate limiting
  • Content Security Policy (CSP) headers

Code Security

  • Regular dependency updates and vulnerability scanning
  • Code review process for all changes
  • Automated security testing in CI/CD pipeline
  • Error tracking and monitoring (Sentry)
  • Secure development lifecycle practices