How does Rejoose ensure the security of my data?
Rejoose applies established security principles to protect customer data across all platforms and APIs.
We use encryption, access controls, and continuous monitoring to safeguard data in transit and at rest. Our infrastructure is hosted on well-established cloud platforms that comply with recognised security standards and best practices.
Security is maintained through:
◊ Encrypted data transmission and storage
◊ Role-based access control
◊ Ongoing monitoring and regular security reviews
For a more detailed description of our security setup, processes, and compliance considerations, please contact us to request our Security Whitepaper.