Security at Treater
At Treater, we take security of your data very seriously.
We understand that our customers trust us with their data and maintaining that trust through robust security practices is our highest priority.
Our Commitment
We implement industry-standard security practices and continuously work to enhance our security posture. Our security program includes:
- Encryption of data in transit and at rest
- Access controls based on the principle of least privilege, for both our users and our internal systems
- Production systems partitioned from the public internet whenever possible
- Partitioning of customer data
- Per-customer encryption keys
- Security training for all employees
- Comprehensive authentication and authorization systems
- Regular security assessments
- Continuous monitoring and incident response procedures
- Secure development practices - changes are reviewed and must pass all tests before being deployed
Compliance Frameworks and Audits
For highly motivated customers, we can provide a guarantee of audit during the contract term.
Questions or Concerns
If you have any questions about our security practices or would like to report a security concern, please contact our security team at security@trytreater.com.