Skip to content

Security

We build for law enforcement, so security and accountability are first‑order features. Below is a practical overview of our posture. If you have specific requirements, we’ll meet them.

HTTPS Secure
TLS + HSTS enforced
Role‑Based Access
Least privilege & approvals
Audit‑Ready
Immutable logs & exports

Hosting & Network

  • HTTPS & HSTS — encryption enforced
  • Reverse proxy — trusted headers only
  • AWS Hosting secure infrastructure

Authentication & RBAC

  • Least privilege — role-based access
  • Separated duties — supervisor/command
  • Scoped feeds — calendars respect roles

Auditing & Retention

  • Immutable logs — who / what / when
  • Exportable — records & reviews
  • Policy retention — configurable

Application security

  • CSP — strict defaults
  • Security headers — X-Frame-Options, Referrer-Policy, nosniff
  • Validation — server-side on all inputs
  • Anti-spam — honeypot on public forms

Data handling

  • Minimization — collect only what’s needed
  • Scoped access — by role and unit
  • Secure exports — audits & records

Availability

  • Uptime — health checks & monitoring
  • Stateless deploys — containerized
  • Zero-downtime — config updates when possible

Compliance posture

  • Policy alignment — with agency standards
  • Configurable retention — to local policy
  • IT compliance — aligned with agency-specific requirements

Frequently asked questions

Clear answers to common security and compliance questions from command and IT teams.

Is data encrypted in transit?

Yes. HTTPS and HSTS are enforced so traffic is encrypted end to end.

Can access be restricted by role?

Yes. Role-based access and least-privilege controls scope access by role and responsibility.

Do you keep audit logs?

Yes. Immutable logs track who did what and when across key workflows.

Can records be exported for audits and reviews?

Yes. Exportable records support policy reviews, audits, and command accountability.

Can security settings align to local agency requirements?

Yes. Settings are configured around agency-specific policy and IT constraints.

How do we report a security concern?

Contact us directly through the security channel below and include as much detail as possible so we can respond quickly.

Security questions or requirements?

We work directly with agency leadership and IT to meet specific standards. Contact us to discuss your requirements or to request documentation.