Security & Privacy by Design
Your data is protected with military-grade encryption, stored exclusively in Canada, and monitored 24/7 by our security team.
How We Protect Your Data
Bank-Level Encryption
Military-grade encryption protects your data at every layer
100% Canadian
Data never leaves Canada
AWS Canada Central Region
All hosting and data storage uses Amazon Web Services Canada Central region, ensuring your data never leaves Canadian soil and complies with all Canadian data residency requirements.
Toronto DC
Primary infrastructure
Montreal DC
Redundant backups
PIPEDA
Full compliance
Encrypted
In transit & at rest
Role-Based Access Control
Every user has precisely the access they need—no more, no less. All actions are logged and auditable.
ADMIN
Full system access, security settings
STAFF
Client management, limited admin
CLIENT
Own data access, portal features
VENDOR
Scoped access to assigned clients
Multi-Factor Auth
TOTP or hardware tokens required for admin
Session Security
Auto-timeout, secure tokens, concurrent limits
Audit Logging
Every action logged with user and timestamp
Rapid Response Protocol
In the unlikely event of a security incident, our team responds immediately with a proven process.
Detection
Automated monitoring triggers alert
Triage
Security team assesses severity
Containment
Immediate threat isolation
Recovery
Full restoration and verification
Security Architecture
WAF & DDoS Protection
First line of defense against attacks
Load Balancer & TLS
Encrypted connections, traffic distribution
API Gateway
Rate limiting, authentication, routing
Application Layer
Business logic with security controls
Database Layer
Encrypted storage, access controls
Security Layers
- Web Application Firewall
- DDoS Protection
- TLS/SSL Termination
- API Rate Limiting
- Authentication & Authorization
- Data Encryption
Monitoring Points
- Network Traffic Analysis
- Application Performance
- Database Access Logging
- User Activity Auditing
- Security Event Correlation
- Compliance Reporting
Security FAQs
Where is my data stored?
Can your support team access my files?
How do you manage encryption keys?
How do you ensure data security?
What happens during a security incident?
Questions About Security?
Our security team is here to answer your questions and provide additional documentation.
Last updated: January 2026