Our Commitment to Security
At Audinto, we take security seriously. We implement industry-standard security measures to protect your data and ensure the confidentiality, integrity, and availability of our services. This page outlines our security practices and how we protect your information.
Data Encryption
In Transit
All data transmitted between your device and our servers is encrypted using Transport Layer Security (TLS) 1.2 or higher. This ensures that your video files and personal information cannot be intercepted or read by unauthorized parties during transmission.
At Rest
Video files and sensitive data stored on our servers are encrypted at rest using industry-standard encryption algorithms. This provides an additional layer of protection against unauthorized access to stored data.
Authentication and Access Control
We use secure authentication methods to protect your account:
- OAuth 2.0: We use Google OAuth for secure, passwordless authentication
- Session Management: Secure session tokens with appropriate expiration times
- Access Controls: Role-based access controls ensure users can only access their own data
- Multi-Factor Authentication: Available for enhanced account security
Infrastructure Security
Cloud Security
Our infrastructure is hosted on secure cloud platforms that implement comprehensive security controls, including:
- Regular security audits and compliance certifications
- Network segmentation and firewall protection
- Intrusion detection and prevention systems
- DDoS protection and mitigation
- Regular security patches and updates
Data Centers
Our data centers are equipped with physical security measures including 24/7 monitoring, access controls, and environmental safeguards to protect against unauthorized physical access and environmental threats.
Data Protection and Privacy
Data Minimization
We collect and process only the data necessary to provide our services. We do not access your video content except as required for processing your translation requests.
Data Retention
Video files are processed and stored temporarily during the translation process. We automatically delete processed videos and temporary files after a reasonable period (typically 30 days), unless you request earlier deletion. You can request deletion of your data at any time through your account settings.
Data Isolation
Each user's data is isolated and accessible only to that user. We implement strict access controls to ensure that your videos and personal information are not accessible to other users or unauthorized personnel.
Security Monitoring and Incident Response
We maintain comprehensive security monitoring systems to detect and respond to security threats:
- 24/7 security monitoring and alerting
- Automated threat detection systems
- Regular security assessments and penetration testing
- Incident response procedures for security breaches
- Regular security training for our team
Third-Party Security
We work with trusted third-party service providers who maintain high security standards:
- Payment Processors: We use PCI-DSS compliant payment processors for secure payment handling
- Cloud Providers: Our infrastructure providers maintain industry-leading security certifications
- AI Services: We use secure APIs from reputable AI service providers with strong security practices
Compliance and Certifications
We are committed to maintaining compliance with relevant data protection regulations, including:
- General Data Protection Regulation (GDPR)
- California Consumer Privacy Act (CCPA)
- Other applicable regional data protection laws
Your Role in Security
Security is a shared responsibility. Here's how you can help keep your account secure:
- Use a strong, unique password for your Google account
- Enable two-factor authentication on your Google account
- Keep your browser and operating system updated
- Be cautious of phishing attempts and suspicious emails
- Log out of your account when using shared devices
- Report any suspicious activity immediately
Security Updates and Notifications
We regularly update our security practices and will notify users of any significant security changes or incidents that may affect them. In the event of a security breach that may affect your data, we will notify affected users as required by law.
Vulnerability Reporting
We encourage responsible disclosure of security vulnerabilities. If you discover a security vulnerability, please report it to us at:
Email: admin@audinto.com
Please include detailed information about the vulnerability and steps to reproduce it. We will respond promptly and work with you to resolve the issue.
Contact Us
If you have any questions or concerns about our security practices, please contact us at:
Email: admin@audinto.com