Security
How we protect your data
Security Best Practices
Following industry security standards
Encryption Everywhere
Data encrypted at rest and in transit (TLS 1.3)
High Availability
Multi-region edge infrastructure for fast, reliable delivery worldwide
Platform Security
Hosting & Availability
- High-availability, multi-region edge delivery
- Automatic DDoS protection at the network edge
- Security patches applied on a regular cadence
Data Storage
- Encrypted databases with strict access controls
- Automated backups with point-in-time recovery
- Access logging for sensitive operations
Application Security
Authentication & Authorization
- OAuth-based sign-in (Google) with secure session cookies
- Password hashing with industry-standard algorithms where passwords are used
- Role-based access control for multi-user plans
- Scoped, hashed API keys for programmatic access
Data Protection
- TLS 1.3 for all connections
- Encryption at rest for stored data
- Rate limiting on public endpoints to mitigate abuse
Operational Practices
Access Controls
- Minimal-access principle for internal systems
- Audit logs for administrative actions
Monitoring
- Continuous infrastructure and application monitoring
- Automated alerting on anomalous activity
Privacy & Compliance
QRZY is built to respect user privacy:
- GDPR-aligned data handling and aggregated analytics (see our GDPR page)
- CCPA-aligned rights for California residents
- Payments handled by our payment provider — we do not store card details on our servers
Formal certifications (e.g. SOC 2, ISO 27001) are not currently held. We'll announce them here when they are in place.
Reporting Security Issues
If you discover a security issue, please report it responsibly by emailing us. We aim to acknowledge reports within two business days.
Email: security@qrzy.co