FotoMate
Security

Your Data is Secure

We implement enterprise-grade security measures to protect your photography business data and client information.

Last updated: March 14, 2025

Security Features

Multi-layered security to keep your business data safe

End-to-End Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

Access Controls

Strict authentication and authorization controls ensure only you can access your data.

Secure Infrastructure

Hosted on secure, compliant cloud infrastructure with 24/7 monitoring and protection.

Data Protection

Encryption

  • In Transit: TLS 1.3 encryption for all data transmission
  • At Rest: AES-256 encryption for stored data
  • Database: End-to-end encrypted database storage
  • Backups: Encrypted backup storage with separate keys

Data Storage

  • • Primary data centers in the United States
  • • Redundant storage across multiple availability zones
  • • Regular automated backups with point-in-time recovery
  • • Data retention policies to minimize storage duration

Access Security

Authentication

  • • Strong password requirements with complexity validation
  • • Secure password reset process with email verification
  • • Session management with automatic timeout
  • • Account lockout protection against brute force attacks

Authorization

  • • Role-based access control (RBAC) system
  • • Principle of least privilege for all system access
  • • API authentication using secure JWT tokens
  • • Regular access review and revocation procedures

Infrastructure Security

Cloud Security

  • • Hosted on Supabase with SOC 2 Type II certification
  • • Network isolation and virtual private cloud (VPC) architecture
  • • DDoS protection and traffic filtering
  • • Web Application Firewall (WAF) protection

Monitoring & Response

  • • 24/7 security monitoring and alerting
  • • Intrusion detection and prevention systems
  • • Security incident response procedures
  • • Regular security audits and vulnerability assessments

Application Security

Secure Development

  • • Secure coding practices and code review processes
  • • Regular dependency updates and vulnerability scanning
  • • Input validation and output encoding to prevent attacks
  • • Security testing as part of the development lifecycle

Protection Measures

  • • Cross-Site Scripting (XSS) protection
  • • Cross-Site Request Forgery (CSRF) protection
  • • SQL injection prevention through parameterized queries
  • • Content Security Policy (CSP) implementation

Privacy & Compliance

Data Privacy

  • • Data minimization - we only collect what's necessary
  • • Purpose limitation - data used only for stated purposes
  • • User control over their data with export and deletion options
  • • Regular privacy impact assessments

Compliance Standards

  • • SOC 2 Type II compliance through Supabase infrastructure
  • • CCPA compliance for California residents
  • • Regular compliance audits and assessments
  • • Industry best practices for data protection

Business Continuity

Backup & Recovery

  • • Automated daily backups with multiple retention periods
  • • Point-in-time recovery capabilities
  • • Cross-region backup replication
  • • Regular backup restoration testing

Availability

  • • 99.9% uptime SLA commitment
  • • Multi-zone redundancy for high availability
  • • Automatic failover and load balancing
  • • Disaster recovery procedures and testing

Security Incident Response

Incident Management

  • • 24/7 security monitoring and alerting
  • • Defined incident response procedures
  • • Rapid containment and mitigation protocols
  • • Post-incident analysis and improvement processes

Communication

  • • Timely notification of security incidents
  • • Transparent communication about remediation steps
  • • Regular security status updates via our status page
  • • Post-incident reports with lessons learned

Your Security Responsibilities

Account Security

  • • Use a strong, unique password for your FotoMate account
  • • Keep your contact information up to date
  • • Log out of shared or public computers
  • • Report any suspicious activity immediately

Client Data Protection

  • • Obtain proper consent before uploading client information
  • • Comply with applicable privacy laws in your jurisdiction
  • • Use secure networks when accessing FotoMate
  • • Regularly review and clean up old client data

Security Certifications

Current Certifications

  • SOC 2 Type II (via Supabase)
  • ISO 27001 (via Supabase)
  • CCPA Compliance

Security Audits

  • • Annual third-party security assessments
  • • Quarterly vulnerability scans
  • • Continuous security monitoring
  • • Regular penetration testing

Security Updates

We continuously improve our security measures and will update this page as we implement new protections.

For the latest security updates and status information, visit our Status Page.

Report Security Issues

If you discover a security vulnerability or have security concerns, please contact us immediately:

Security Email: [email protected]

Support: [email protected]

Response Time: Security issues are prioritized and responded to within 24 hours

Responsible Disclosure

We encourage responsible disclosure of security vulnerabilities. Please do not publicly disclose issues until we have had a chance to address them.