Monitor.top

Trust Center

Last updated: March 1, 2026

Security and trust are foundational to everything we build at Monitor.top. This page outlines our security practices, data protection measures, and compliance commitments.

Infrastructure Security

Our infrastructure is designed with security as a first principle:

  • All data encrypted in transit (TLS 1.3) and at rest.
  • Infrastructure hosted in EU data centers with SOC 2 Type II certified providers.
  • Automated vulnerability scanning and dependency monitoring.

Data Protection

We handle your data with care and transparency:

  • GDPR-compliant data processing with clear legal bases.
  • Data minimization — we only collect what we need.
  • Transparent data retention and deletion policies.

Compliance

We align with recognized standards and frameworks:

  • GDPR — full compliance as an EU-based company.
  • OWASP Top 10 — our development follows secure coding practices.
  • Regular security audits and penetration testing.

Access Control

We enforce strict access controls including role-based access, multi-factor authentication for all internal systems, and the principle of least privilege. Access to production systems is logged and audited.

Incident Response

We maintain a documented incident response plan with defined escalation paths, communication protocols, and post-incident review processes. Security incidents are communicated transparently to affected parties.

Vendor Management

All third-party vendors and service providers are evaluated for security practices and bound by data processing agreements. We regularly review vendor security posture and compliance.

Security Contact

To report a security concern or request our security documentation, contact us at [email protected].