Security
How JiroApps protects data, infrastructure, and service integrity.
Security is a core part of how JiroApps designs and operates software. We build systems with a focus on simplicity, strong defaults, and modern infrastructure practices that protect both our users and our services.
Infrastructure security
Our services are hosted on secure cloud infrastructure with industry-standard protections including network isolation, encrypted communication, and controlled access to production systems.
Access to production systems is restricted to authorized personnel and protected using strong authentication practices.
Encryption
All traffic between your device and our services is encrypted using HTTPS and modern TLS protocols.
Where appropriate, sensitive data is also encrypted at rest within our infrastructure.
Authentication and access control
We use secure authentication mechanisms to protect user accounts and administrative access. Access to internal systems is limited to the minimum permissions required to perform specific operational tasks.
Application security
Security considerations are built into our development process. Applications are designed to prevent common web vulnerabilities including unauthorized access, injection attacks, and misuse of APIs.
We regularly review and update dependencies and infrastructure components to maintain a secure environment.
Monitoring and protection
Our systems are monitored to detect unusual activity, performance issues, or potential abuse. Logging and monitoring help us identify and respond to issues quickly.
Responsible disclosure
If you believe you have discovered a security vulnerability, we encourage responsible disclosure. Please contact us through the contact page with details so we can investigate and resolve the issue as quickly as possible.
Continuous improvement
Security practices evolve as our services and infrastructure grow. We continuously review our systems and processes to maintain a high level of protection for our users and services.