Skip to content
  • There are no suggestions because the search field is empty.

How does Rejoose ensure the security of my data?

Rejoose applies established security principles to protect customer data across all platforms and APIs.

We use encryption, access controls, and continuous monitoring to safeguard data in transit and at rest. Our infrastructure is hosted on well-established cloud platforms that comply with recognised security standards and best practices.

Security is maintained through:

◊ Encrypted data transmission and storage
Role-based access control
Ongoing monitoring and regular security reviews

For a more detailed description of our security setup, processes, and compliance considerations, please contact us to request our Security Whitepaper.