Security

Security Documentation

Review the control posture, disclosure workflow, and security evidence expected in regulated public-safety and investigative environments.

Security posture

Map control behavior, disclosure flow, and oversight response targets before procurement or incident review starts.

Audit coverage

100%

Disclosure acknowledgement target

<24h

Framework mappings

23+

Transport baseline

TLS 1.3

Review surfaces

Security should be inspectable in the same workflow operators and reviewers already use

Security evidence is stronger when access controls, evidence handling, and review notes stay attached to the investigative record instead of being described as abstract platform promises.

Control family

Data Encryption

Protect investigative records and evidence packages with encryption at rest, modern transport security, and managed key handling.

Control family

Access Control

Enforce mission-aware access with identity controls, MFA, and reviewable audit trails rather than broad application-wide visibility.

Control family

Security Monitoring

Surface misuse patterns, unexpected access, and operational anomalies quickly enough for security and supervisory review.

Review context

Linked source and note history

Reviewer notes, source context, and access decisions should stay visible on the same operating surface.

Evidence control

Chain-of-custody view

Evidence handling and audit controls need to be inspectable without leaving the case workflow.

Disclosure process

Vulnerability Disclosure

Responsible disclosure works best when reporters know the intake path, acknowledgement target, and how coordination will be handled.

  1. 1

    Submit a complete report

    Report the vulnerability to [email protected] with technical detail, reproduction context, and affected workflow scope.

  2. 2

    Receive acknowledgement

    Our security team acknowledges receipt within 24 hours and confirms the handoff path for follow-up.

  3. 3

    Track validation and remediation

    We validate the report, scope impact, and keep the reporter informed while remediation is planned and executed.

  4. 4

    Coordinate disclosure timing

    When a fix is ready, we coordinate any appropriate disclosure timing with the reporting party.

Security Contact

Security reporting channel

Use the security channel for disclosure, control questions, or review requests tied to a procurement or oversight process.

[email protected]

Initial acknowledgement

Within 24 hours

Encrypted exchange

PGP on request

PGP key available upon request for encrypted communication.

Need the broader control set?

Use the main security materials when the review moves from disclosure handling into architecture, compliance, and runtime controls.