Trust Center
Last updated: March 1, 2026
Security and trust are foundational to everything we build at Monitor.top. This page outlines our security practices, data protection measures, and compliance commitments.
Infrastructure Security
Our infrastructure is designed with security as a first principle:
- All data encrypted in transit (TLS 1.3) and at rest.
- Infrastructure hosted in EU data centers with SOC 2 Type II certified providers.
- Automated vulnerability scanning and dependency monitoring.
Data Protection
We handle your data with care and transparency:
- GDPR-compliant data processing with clear legal bases.
- Data minimization — we only collect what we need.
- Transparent data retention and deletion policies.
Compliance
We align with recognized standards and frameworks:
- GDPR — full compliance as an EU-based company.
- OWASP Top 10 — our development follows secure coding practices.
- Regular security audits and penetration testing.
Access Control
We enforce strict access controls including role-based access, multi-factor authentication for all internal systems, and the principle of least privilege. Access to production systems is logged and audited.
Incident Response
We maintain a documented incident response plan with defined escalation paths, communication protocols, and post-incident review processes. Security incidents are communicated transparently to affected parties.
Vendor Management
All third-party vendors and service providers are evaluated for security practices and bound by data processing agreements. We regularly review vendor security posture and compliance.
Security Contact
To report a security concern or request our security documentation, contact us at [email protected].