Security Policy

At OPQC Labs Inc., your data security is our top priority. This Security Policy details the steps we take to ensure your data is protected and that we follow industry best practices.

1. Data Minimization

We practice data minimization, collecting only the necessary information to provide and improve our services. We do not collect payment information, and the only Personally Identifiable Information (PII) we collect is the email address you provide for your account.

2. Data Encryption

All data is encrypted both in transit and at rest. We use state-of-the-art encryption protocols to safeguard information sent between your device and our servers, as well as data stored in our databases.

3. Data Access and Privacy

We respect your privacy by ensuring that no unauthorized access to your data is permitted. Access controls and strict authentication measures are in place to ensure that only authorized personnel have limited access.

4. Data Availability

Your data is available when you need it. We use off-site replication and backup strategies to ensure continuity and rapid recovery in case of an incident.

5. Communication Policy

We are committed to responsible communication. We do not send spam or unsolicited emails. All communications are relevant to your account or necessary for the operation of our service.

6. Industry Best Practices

We implement industry best practices across all aspects of our security operations. Some of these best practices include:

  • Secure Coding and Development: Adopting secure development life-cycle processes and code reviews to minimize vulnerabilities.
  • Vulnerability Scanning and Penetration Testing: Performing regular security assessments and tests to identify and resolve potential issues.
  • Access Control and Multi-Factor Authentication: Implementing strict access control mechanisms and multi-factor authentication to prevent unauthorized access.
  • Regular Audits and Compliance: Maintaining compliance with security standards such as NIST, ISO 27001, and other relevant frameworks.
  • Patch Management and Updates: Ensuring all systems are promptly updated and patched to protect against known vulnerabilities.
  • Monitoring and Logging: Continuously monitoring systems and maintaining logs to detect and respond to security events.

7. Data Usage Policies

We do not use your data for model training, nor do we partner with providers who do so. Our focus is strictly on safeguarding your information and ensuring its proper use only for delivering our services.

8. Data Hosting

All data is hosted within the United States, where we adhere to applicable local and federal data protection regulations.

9. Data Removal and Export

You can request that your data be removed or exported at any time. We are committed to transparent data management and will promptly take the necessary actions on such requests.

10. Contact Us

If you have any questions or concerns regarding our security practices, please reach out to us at [email protected].