How We Protect Your Data
At Uliasti GmbH, security is a core part of how we design, build, and operate our products and services, including Advanzo, Techify, and Uliasti AI.
We apply industry-standard technical and organizational measures to protect data against unauthorized access, loss, misuse, or disclosure.
Security is an ongoing process, and we continuously review and improve our controls as technologies and threats evolve.
Data Storage and Backups
- Customer data is stored on reliable infrastructure designed to minimize single points of failure.
- Data is backed up regularly and stored in separate locations to support recovery in case of incidents.
- Uploaded files are stored on systems designed for durability and availability.
- Backups are protected and encrypted where appropriate.
Data in Transit and at Rest
- All data transmitted between users and our Services is encrypted using TLS/HTTPS.
- Within private and secured internal networks, data may be transferred unencrypted where appropriate and protected by network-level security controls.
- Files uploaded to the Services are encrypted at rest.
- Application databases are protected by access controls, monitoring, and strict operational safeguards.
- Database backups are encrypted and access-restricted.
Infrastructure and Redundancy
- Our infrastructure is designed with redundancy across critical components such as compute, storage, and networking.
- Services are engineered to continue operating even in the event of hardware or component failures.
- We rely on professionally managed data centers and cloud providers with strong availability and resilience standards.
Physical Security
- Data centers used by Uliasti or its infrastructure providers implement physical security measures such as access controls, surveillance, and monitoring.
- Access to systems and facilities is restricted to authorized personnel only.
- Physical access controls are managed and audited by our infrastructure partners.
Secure and Maintained Systems
- Systems and dependencies are updated regularly with security patches.
- Firewalls, network segmentation, and access controls are used to limit exposure.
- We monitor systems for vulnerabilities and abnormal behavior.
- Where appropriate, we work with external security experts and follow responsible disclosure practices.
Access Controls and Internal Security
- Access to customer data is restricted to authorized personnel on a need-to-know basis.
- Administrative access is logged and monitored.
- Internal access to production systems follows least-privilege principles.
- Employees and contractors are bound by confidentiality and security obligations.
Unauthorized access to customer data by personnel is strictly prohibited and may result in disciplinary action, including termination and legal consequences.
Billing and Payment Security
- Payment processing is handled by trusted, PCI-compliant payment service providers.
- Uliasti does not store full credit card details on its systems.
- Payment data is transmitted and processed using strong encryption and secure channels.
Monitoring and Incident Response
- We continuously monitor our systems for security events and suspicious activity.
- Alerts and logging help us detect and respond to potential threats promptly.
- We maintain incident response procedures to investigate, contain, and remediate security incidents.
If a data security incident affecting customer data occurs, we will notify affected customers without undue delay, in accordance with applicable laws and contractual obligations.
Shared Responsibility
Security is a shared responsibility. Customers are responsible for:
- safeguarding account credentials
- configuring access permissions appropriately
- securing their own devices and networks
We strongly recommend using strong passwords and enabling additional security features where available.
Reporting Security Issues
If you believe you have discovered a security vulnerability, abuse, misuse, or incident related to any Uliasti Service, please contact us promptly at: security@uliasti.com
Please provide sufficient detail so we can investigate responsibly. We appreciate responsible disclosure and collaboration.
Learn More
This Security Overview provides a high-level summary. Additional security, privacy, and data protection details can be found in our:
Contact
If you have questions about these Terms, please contact us via policy@uliasti.com.