Security Policy
**Last Updated:** January 18, 2025
Number Ready takes the security of your payroll data seriously. This Security Policy describes our security practices, infrastructure, and commitment to protecting your information.
1. Security Overview
Number Ready implements industry-standard security measures across all layers of our platform:
2. Infrastructure Security
2.1 Hosting and Cloud Services
Our infrastructure is built on enterprise-grade, SOC 2 Type 2 certified providers:
| Service | Provider | Certification | Purpose |
|---------|----------|---------------|---------|
| **Application Hosting** | Vercel | SOC 2 Type 2 | Web application and API hosting |
| **Database** | Neon/Supabase | SOC 2 Type 2 | PostgreSQL database with encryption |
| **Payment Processing** | Stripe | PCI DSS Level 1 | Secure payment and billing |
| **Error Tracking** | Sentry | GDPR Compliant | Application monitoring and debugging |
2.2 Data Center Security
All infrastructure providers maintain:
2.3 Network Security
3. Data Encryption
3.1 Encryption in Transit
All data transmitted to and from Number Ready is encrypted using:
3.2 Encryption at Rest
All stored data is encrypted using:
3.3 Encryption in Use
4. Access Control
4.1 Multi-Factor Authentication (MFA)
MFA is required for all administrative and production access:
4.2 Role-Based Access Control (RBAC)
4.3 Employee Access
Number Ready is currently a solo-founded operation:
4.4 Session Management
5. Application Security
5.1 Secure Development Practices
5.2 API Security
5.3 Data Validation
6. Vulnerability Management
6.1 Dependency Management
- Critical vulnerabilities: Patched within 24 hours
- High vulnerabilities: Patched within 7 days
- Medium vulnerabilities: Patched within 30 days
- Low vulnerabilities: Patched in next release cycle
6.2 Infrastructure Patching
6.3 Vulnerability Scanning
7. Security Monitoring and Incident Response
7.1 Continuous Monitoring
7.2 Incident Response Procedure
In the event of a security incident:
Detection (0-2 hours):
Assessment (2-6 hours):
Containment (4-8 hours):
Eradication (8-24 hours):
Recovery (24-48 hours):
Notification:
Post-Incident Review:
7.3 Incident Response SLAs
| Severity | Initial Response | Resolution Target | Customer Notification |
|----------|------------------|-------------------|----------------------|
| **Critical** | 1 hour | 24 hours | Within 24 hours |
| **High** | 4 hours | 3 days | Within 72 hours |
| **Medium** | 24 hours | 1 week | If data affected |
| **Low** | 3 days | 2 weeks | Not required |
8. Data Protection and Privacy
8.1 Data Minimization
We collect only data necessary to provide the Service:
8.2 Data Retention
| Data Type | Retention Period | Reason |
|-----------|------------------|---------|
| Active payroll data | While subscription active | Provide service |
| Deleted accounts | 30-day soft delete | Allow recovery |
| Payroll records | 7 years after termination | Legal compliance (IRS, FLSA) |
| Security logs | 1 year | Incident investigation |
| Application logs | 90 days | Debugging and monitoring |
8.3 Data Deletion
Upon account deletion:
8.4 Third-Party Data Sharing
We share data only with:
We never:
9. Compliance and Certifications
9.1 Current Compliance
9.2 Future Certifications (Planned)
10. Employee Security
10.1 Background Checks
10.2 Security Training
10.3 Confidentiality Agreements
10.4 Access Revocation
Upon employee departure:
11. Disaster Recovery and Business Continuity
11.1 Backup Strategy
11.2 Recovery Time Objectives
| System | RTO (Recovery Time Objective) | RPO (Recovery Point Objective) |
|--------|-------------------------------|--------------------------------|
| **Application** | 4 hours | 24 hours |
| **Database** | 8 hours | 24 hours |
| **Authentication** | 2 hours | 1 hour |
11.3 Disaster Recovery Plan
12. Responsible Disclosure
12.1 Reporting Security Vulnerabilities
If you discover a security vulnerability in Number Ready:
DO:
DON'T:
12.2 Our Commitment
We commit to:
12.3 Bug Bounty Program
Currently, we do not offer a formal bug bounty program. However:
13. Contact Information
For security-related inquiries:
Security Team:
General Inquiries:
14. Security Policy Updates
This Security Policy may be updated from time to time to reflect:
Material changes will be communicated via:
Number Ready is committed to maintaining the highest standards of security and privacy. We continually invest in security measures to protect your payroll data and earn your trust.
**Last reviewed:** January 18, 2025
**Next scheduled review:** July 18, 2025
*For questions about this Security Policy, contact security@numbeready.com.*
For security inquiries or to report vulnerabilities, contact security@numbeready.com