Trust · Security
Security at Secov
We build and operate Secov with security-first practices to protect customer data and maintain trust.
Security overview
- Encryption: TLS in transit and encryption at rest for sensitive data where applicable.
- Access controls: least-privilege access, role-based controls, and MFA for internal access where supported.
- Auditability: immutable audit logging for key actions inside the platform.
Secure development
We follow secure development practices including code review, change management, and monitoring designed to reduce risk and respond quickly to issues.
Vulnerability reporting
If you believe you've found a security vulnerability, please email security@secov.com with details. We will review reports and work to remediate verified issues.
Subprocessors and data processing
We may use subprocessors to deliver our services. See Subprocessors for more information, and contact us for customer data processing terms.