Security Overview
Last Updated: January 23, 2025
Non-Binding Information
This Security Overview summarizes core safeguards. It is not a contractual commitment unless incorporated into an enterprise agreement.
1. Infrastructure
- Hosted exclusively in United States-based cloud infrastructure
- Multi-zone redundancy for availability
- Regular patching and security updates
- Firewalls and network segmentation
- Access controls and audit logging
2. Data Encryption
- In transit: TLS 1.2+ encryption
- At rest: Industry-standard encryption for databases and file storage
3. Access Controls
- Role-based access privileges
- Principle of least privilege
- Multi-factor authentication (MFA) enforced for administrative access
- Logged and monitored access events
4. Runtime Security
- Customer data isolation
- Abuse detection systems
- Agent-run monitoring for anomalies
- Prevention of unusual API activity
5. Vulnerability Management
- Regular vulnerability scanning
- Third-party security assessments where appropriate
- Prompt remediation cycles
6. Incident Response
We maintain an internal incident response protocol including:
- Identification and triage
- Containment and mitigation
- Eradication of threats
- Recovery and validation
- Notification where legally required
7. Subprocessors
We use trusted vendors for:
- Cloud hosting infrastructure
- AI model providers (industry-leading providers)
- Payment processors (Stripe)
- Email delivery systems
- Authentication services (Clerk)
8. Customer Responsibilities
Users must:
- Protect account credentials
- Maintain secure devices
- Not share passwords
- Review outputs for accuracy and safety
- Use the platform legally and responsibly
For enterprise customers, see Enterprise Security Addendum.
Security Team
Email: security@quroi.com
© 2025 QuROI, Inc. All rights reserved.