Data Security
Last Updated: October 12, 2025
Our Commitment to Security
At Renoz, we take the security of your data seriously. This page outlines the technical and organizational measures we implement to protect your personal information and business data. While no system can guarantee absolute security, we continuously work to maintain industry-standard security practices.
1. Data Encryption
Encryption in Transit
All data transmitted between your device and our servers is encrypted using TLS/SSL (Transport Layer Security) with a minimum of TLS 1.2. This protects your data from interception during transmission.
Encryption at Rest
Sensitive data stored in our databases is encrypted at rest using AES-256 encryption. This includes passwords, payment information, and other sensitive personal information.
Password Security
User passwords are never stored in plain text. We use industry-standard bcrypt hashing with salt to protect your password. Even our administrators cannot access your password.
2. Infrastructure Security
Cloud Infrastructure
Our services are hosted on enterprise-grade cloud infrastructure:
- Supabase: Enterprise PostgreSQL hosting with automatic backups and high availability
- Vercel: Global edge network with DDoS protection and automatic scaling
- AWS (via Supabase): Data centers with physical security, redundant power, and network connectivity
Network Security
- Firewalls to control traffic and prevent unauthorized access
- DDoS protection to maintain service availability
- Intrusion detection and prevention systems
- Regular security patches and updates
- Network segmentation to isolate sensitive systems
Data Backups
- Automated daily backups of all user data
- Geographic redundancy across multiple data centers
- Point-in-time recovery capabilities
- Regular backup testing and verification
- Encrypted backup storage
3. Application Security
Authentication & Authorization
- Multi-factor authentication support (OAuth with Google)
- Session management with automatic timeout
- Role-based access control (RBAC)
- Secure password requirements (minimum 6 characters)
- Account lockout after multiple failed login attempts
Security Best Practices
- Protection against SQL injection attacks
- Cross-Site Scripting (XSS) prevention
- Cross-Site Request Forgery (CSRF) protection
- Input validation and sanitization
- Secure API endpoints with rate limiting
- Content Security Policy (CSP) headers
Code Security
- Regular dependency updates and vulnerability scanning
- Code review process for all changes
- Automated security testing in CI/CD pipeline
- Error tracking and monitoring (Sentry)
- Secure development lifecycle practices