1. Data Protection
- All data is encrypted in transit using TLS
- Secure storage practices with encryption at rest
- Strict access controls enforced per role
2. Access Control
- Role-based permissions within organizations
- Organization-level data isolation โ your data is never accessible to other accounts
- Principle of least privilege applied to all internal systems
3. Auditability
- All user actions are logged
- Job execution is fully traceable
- Version history is maintained for product data changes
4. Infrastructure
- Continuous monitoring of all systems
- Regular security updates and patches
- Automated vulnerability scanning
5. Incident Response
In case of a security incident:
- Affected users will be notified promptly
- Immediate mitigation actions will be taken
- A post-incident report will be made available when appropriate
To report a security concern, contact security@commercer.io.
Commercer LLC ยท 33 N Gould St, Sheridan, WY 82801