Security & Data Protection
Last updated: January 31, 2026
Security is foundational to our platform. We design our systems to protect customer data while maintaining flexibility, performance, and transparency.
Our Approach to Security
Our security practices are aligned with widely accepted industry standards and are continuously evaluated as our platform evolves.
We primarily serve business and professional users and understand the importance of protecting sensitive, proprietary, and regulated content.
Data Hosting & Infrastructure Security
Customer data is hosted on enterprise-grade cloud infrastructure designed to meet modern security, availability, and durability standards.
Our hosting environment provides:
- Physically secured data centers
- Network-level protections and isolation
- Redundant storage and high availability architecture
- Continuous monitoring and operational safeguards
We operate under a shared responsibility model, where the infrastructure provider secures the underlying platform and we secure the application, data access, and operational controls.
Data Encryption
- Data in transit is protected using industry-standard TLS encryption.
- Data at rest is stored on encrypted systems managed by our infrastructure providers.
- Encryption practices follow current security best practices appropriate to the sensitivity of stored content.
Access Control & Authentication
We do not manage or store user passwords.
Authentication is handled through trusted third-party identity providers, including:
- Microsoft
- Apple
These providers support modern security measures such as multi-factor authentication (MFA), account monitoring, and recovery protections.
We strongly recommend enabling MFA and following identity-provider security guidance to protect account access.
User Responsibility & Shared Security Model
Security is a shared responsibility between our platform and our users.
We are responsible for securing the platform, infrastructure integrations, and application-level safeguards.
Users are responsible for:
- Managing access to their accounts
- Ensuring proper authorization for uploaded content
- Controlling who may view or share their data
- Complying with applicable laws, regulations, and internal policies
We do not verify business accuracy, legal compliance, or regulatory suitability of uploaded content beyond our platform restrictions.
Content Monitoring & Acceptable Use
As a hosting provider for user-generated video content, we maintain safeguards to protect our platform and customers.
We reserve the right to audit, restrict, remove, or disable access to content that violates our policies, including but not limited to:
- Pornographic or sexually explicit material
- Content involving minors
- Hate speech, violence, or extremist content
- Intellectual property infringement
- Illegal, abusive, or exploitative material
- Content uploaded without proper authorization or consent
Content may be removed without prior notice if it poses legal, security, reputational, or operational risk.
Proprietary Safeguards & Platform Controls
We implement proprietary safeguards designed to:
- Enforce platform usage restrictions
- Detect misuse, abuse, or anomalous behavior
- Protect system availability and integrity
- Support security expectations of business customers
Details of these controls are not publicly disclosed to prevent circumvention.
Data Retention & Deletion
We retain customer data only as necessary to provide our services or meet legal, operational, or contractual requirements.
Users may request deletion of their data, subject to:
- Active account status
- Legal retention obligations
- Backup and recovery processes
Deleted data is removed from active systems and phased out of backups according to standard retention cycles.
Business & Enterprise Considerations
Our security posture is designed to support business and enterprise use cases, including:
- Secure identity-based access
- Controlled content sharing
- Scalable infrastructure for high-volume workloads
- Alignment with common IT and procurement expectations
We are available to engage with customer security or compliance teams as part of due-diligence processes.
Security Assurance & Risk Management
We design our platform using industry-standard security practices, defense-in-depth controls, and continuous monitoring to reduce risk and protect customer data.
While no technology environment can be guaranteed to be entirely free from risk, we take a proactive approach to identifying, mitigating, and responding to security threats.
Our focus is on prevention, detection, and response, supported by secure infrastructure, controlled access, and operational safeguards appropriate for business use cases.
Updates to This Policy
We may update this Security & Data Protection page to reflect changes in technology, regulations, or our platform. Updates will be posted on this page.
Contact
For security-related questions or concerns, please contact us at [email protected].