Security
Last updated: 2026-03-07
1. Our Security Practices
CEvident takes the security of your data seriously. We implement the following measures to protect your information:
- Encryption in transit: All data is transmitted over HTTPS/TLS
- Encryption at rest: Data is encrypted at rest in our database
- Authentication: Passwords are hashed using industry-standard algorithms (bcrypt/argon2)
- Email verification: Required before account activation
- Session management: Automatic session timeout for inactive users
- Input validation: Server-side validation and sanitization of all user input
- Rate limiting: Protection against brute-force and abuse
- Access controls: Role-based access with strict user data isolation
2. Third-Party Security
We use trusted third-party providers that maintain their own security certifications:
- Stripe: PCI DSS Level 1 compliant payment processing
- Convex: SOC 2 compliant database and backend
- Vercel: SOC 2 compliant hosting platform
- Resend: Secure email delivery
3. Vulnerability Disclosure Policy
We welcome responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to us so we can address it promptly.
How to Report
Email security reports to support@cevident.io with the subject line "Security Vulnerability Report".
What to Include
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested remediation
Our Commitment
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will investigate and provide an initial assessment within 5 business days
- Resolution: We aim to resolve confirmed vulnerabilities within 90 days
- No legal action: We will not pursue legal action against researchers who report in good faith and follow responsible disclosure practices
4. Scope
The following types of vulnerabilities are in scope:
- Authentication and authorization flaws
- Data exposure or leakage
- Cross-site scripting (XSS)
- SQL injection or NoSQL injection
- Server-side request forgery (SSRF)
- Cross-site request forgery (CSRF)
- Insecure direct object references
Out of scope: Social engineering, physical attacks, denial of service, issues in third-party services, and vulnerabilities requiring physical access to a user's device.
5. Data Breach Notification
In the event of a data breach that affects your personal information, we will:
- Notify affected users by email without unreasonable delay and no later than 72 hours after discovery
- Provide details about the nature of the breach, the categories of data affected, and our response actions
- Notify the California Attorney General if the breach affects more than 500 California residents, as required by Cal. Civ. Code § 1798.82
- Comply with all applicable state breach notification laws
- Provide guidance on steps you can take to protect yourself
6. Contact
For security questions or to report a vulnerability: support@cevident.io