Control family
Data Encryption
Protect investigative records and evidence packages with encryption at rest, modern transport security, and managed key handling.
Review the control posture, disclosure workflow, and security evidence expected in regulated public-safety and investigative environments.
Security posture
Map control behavior, disclosure flow, and oversight response targets before procurement or incident review starts.
Audit coverage
100%
Disclosure acknowledgement target
<24h
Framework mappings
23+
Transport baseline
TLS 1.3
Review surfaces
Security evidence is stronger when access controls, evidence handling, and review notes stay attached to the investigative record instead of being described as abstract platform promises.
Control family
Protect investigative records and evidence packages with encryption at rest, modern transport security, and managed key handling.
Control family
Enforce mission-aware access with identity controls, MFA, and reviewable audit trails rather than broad application-wide visibility.
Control family
Surface misuse patterns, unexpected access, and operational anomalies quickly enough for security and supervisory review.
Review context
Reviewer notes, source context, and access decisions should stay visible on the same operating surface.
Evidence control
Evidence handling and audit controls need to be inspectable without leaving the case workflow.
Disclosure process
Responsible disclosure works best when reporters know the intake path, acknowledgement target, and how coordination will be handled.
Report the vulnerability to [email protected] with technical detail, reproduction context, and affected workflow scope.
Our security team acknowledges receipt within 24 hours and confirms the handoff path for follow-up.
We validate the report, scope impact, and keep the reporter informed while remediation is planned and executed.
When a fix is ready, we coordinate any appropriate disclosure timing with the reporting party.
Security Contact
Use the security channel for disclosure, control questions, or review requests tied to a procurement or oversight process.
Initial acknowledgement
Within 24 hours
Encrypted exchange
PGP on request
PGP key available upon request for encrypted communication.
Use the main security materials when the review moves from disclosure handling into architecture, compliance, and runtime controls.