Security & Privacy
Your trust is our top priority. Below we explain how we protect your data, the controls you have, and the security practices we follow to keep everything safe.
Encryption in transit and at rest
We protect data in transit using modern TLS (1.2/1.3) and encrypt sensitive data at rest where applicable. Keys are managed using industry best practices and rotated regularly to reduce exposure.
Access control & least privilege
Access to production data is limited by the principle of least privilege. Strong authentication, role-based access controls, and audit logs are used to track and review access. Administrative actions are logged and periodically reviewed.
Data export and deletion
You control your information. At any time you can export your data (JSON/CSV/PDF) or request complete account and data deletion. Export tools are available in the user dashboard, or you can contact support for assistance.
- Export: full download of your memories in JSON/CSV formats.
- Delete: permanent removal of all data associated with your account.
- Retention: backup copies are removed within documented retention windows after deletion, except where legal obligations apply.
Privacy by design
We design systems to collect the minimum data required and to give users control over what is stored. We do not sell your personal data. Third-party providers are used only when necessary and are bound by strict data processing agreements.
Operational practices & compliance
Our security program follows industry-standard controls, including vulnerability management, code reviews, and regular penetration testing. Where applicable, we pursue compliance with relevant regulations (e.g., GDPR) and maintain internal policies for data protection.
Monitoring & incident response
We run continuous monitoring to detect anomalous activity and maintain an incident response plan that covers investigation, mitigation, and communication. If an incident affects your data, we will notify you in accordance with legal and best practice requirements.
Data governance
Teams regularly review retention, access, and data minimization practices. Dependencies and libraries are kept up to date, and engineering, product, and compliance collaborate to maintain a high security standard.
How to request export or deletion
- Open your account dashboard at Dashboard and use the export/delete options.
- If you prefer, email support with the subject "Export/Delete request" and we will guide you through the process.
- You will receive confirmation by email once the request is completed.
Frequently asked questions
For more technical details or to report a security concern, contact our security team at [email protected].