Trust Report
Glovair's Commitment to Security, Privacy, and Transparency
Executive Summary
Glovair is committed to maintaining the highest standards of security, privacy, and transparency. This Trust Report outlines our security practices, compliance certifications, and commitment to protecting customer data. We believe trust is earned through transparency and consistent security practices.
🔒 Your data is protected with enterprise-grade security
1. Security Infrastructure
Data Encryption
- In Transit: TLS 1.3 encryption for all data transmitted over networks
- At Rest: AES-256 encryption for stored personal data
- Payment Data: PCI DSS Level 1 compliant through Stripe and PayPal
- Database Encryption: All databases use per-table encryption
Network Security
- Enterprise-grade firewalls and DDoS protection
- Web Application Firewall (WAF) with threat detection
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Regular penetration testing by independent third parties
- Secure API endpoints with rate limiting and authentication
Access Control
- Multi-factor authentication (MFA) support for all accounts
- Role-based access control (RBAC) for staff
- Principle of least privilege for system access
- Regular access reviews and audit logs
- Session timeout and automatic logout mechanisms
2. Compliance Certifications
🏆 SOC 2 Type II
Status: Compliant
Independent audit confirming our security controls, availability, processing integrity, and confidentiality measures meet SOC 2 standards. Annual audits ensure continuous compliance.
🔐 GDPR (General Data Protection Regulation)
Status: Fully Compliant
All data processing activities comply with GDPR requirements. We respect all data subject rights including access, rectification, erasure, and data portability.
🛡️ CCPA (California Consumer Privacy Act)
Status: Fully Compliant
California residents have the right to know, delete, and opt-out of data sales. We provide these rights through clear opt-in/opt-out mechanisms.
💳 PCI DSS Level 1
Status: Compliant
Highest level of payment card industry compliance. Payment processing is handled by certified providers (Stripe, PayPal). We never store raw card data.
📋 ISO 27001
Status: Implementing (Certification in progress)
International standard for information security management systems. Implementation roadmap includes full certification by Q3 2026.
3. Data Privacy Practices
Collection & Use
- We only collect data necessary to provide our services
- Clear opt-in mechanisms for marketing communications
- Easy opt-out options in every marketing email
- Transparent privacy notices at data collection points
- Privacy by Design principles embedded in all new features
Data Sharing
- We do not sell personal data to third parties
- Limited sharing with trusted service providers under strict agreements
- All sub-processors are contractually bound to maintain security
- Full transparency about who we share data with
- Customers control their own data sharing preferences
Data Retention
- Personal data retained only as long as necessary
- Automatic deletion of inactive accounts after 2 years
- Secure deletion of all customer data upon account termination
- Legal data retained for 7 years in encrypted archives
- Customers can request data export or deletion anytime
4. Incident Response & Breach Notification
Incident Response Team
Glovair maintains a dedicated security team that operates 24/7 to monitor systems and respond to incidents:
- Real-time security monitoring and alerting systems
- Documented incident response procedures
- Regular incident simulations and tabletop exercises
- Vendor incident response support agreements
- Forensic analysis capabilities
Breach Notification Policy
In the event of a data breach affecting customer data:
- Customers are notified within 72 hours of discovery
- Detailed information about the breach is provided
- Recommended protective actions are shared
- Regulatory authorities are notified as required
- Complete transparency about impact and remediation
Incident Reporting: [email protected]
5. Infrastructure & Uptime
Hosting & Infrastructure
- Multi-region cloud infrastructure for redundancy
- Automatic failover between data centers
- Geographic data replication for disaster recovery
- Load balancing across multiple servers
- 99.99% uptime SLA with transparent status page
Monitoring & Performance
- Real-time performance monitoring and alerting
- Automated system health checks every 60 seconds
- Capacity planning to prevent outages
- Database performance optimization
- CDN integration for fast global content delivery
Backup & Disaster Recovery
- Continuous backup of all customer data
- Multiple backup locations across different regions
- Regular restore testing to ensure backup integrity
- Recovery time objective (RTO) of 1 hour
- Recovery point objective (RPO) of 15 minutes
6. Security Testing & Vulnerability Management
Regular Testing
- Quarterly penetration testing by independent firms
- Monthly vulnerability scanning of all systems
- Annual security architecture review
- Automated vulnerability detection integrated in CI/CD pipeline
- Bug bounty program to incentivize responsible disclosure
Vulnerability Management
- CVSS severity-based prioritization
- Critical vulnerabilities patched within 24 hours
- High severity vulnerabilities patched within 7 days
- Medium and low severity patched within 30 days
- Transparent communication of security patches
Responsible Disclosure
We have a responsible vulnerability disclosure policy. Security researchers can report vulnerabilities to: [email protected]
7. Employee Security & Training
Access & Accountability
- Background checks for all employees with data access
- Signed confidentiality and security agreements
- Multi-factor authentication required for all staff systems
- Role-based access control with regular audits
- Automatic session logout after 15 minutes of inactivity
Training & Awareness
- Annual security awareness training for all employees
- Quarterly data privacy training
- Phishing simulation tests and awareness campaigns
- Security best practices documentation
- Incident response training for relevant staff
Offboarding
- Immediate access revocation upon termination
- Secure deletion of personal devices
- Return of all company equipment
- Final data access audit
8. Legal & Compliance
Data Processing Agreements
We maintain standard Data Processing Agreements (DPA) that comply with GDPR and other regulations. Customers can request modified DPAs for specific requirements.
Regulatory Cooperation
- Full cooperation with regulatory investigations
- Timely response to data subject access requests
- Support for regulatory audits
- Transparent disclosure of legal requests
- Compliance with international data protection laws
Legal Requests
We only disclose customer data in response to valid legal requests (subpoenas, warrants, court orders). We:
- Notify customers of legal requests when legally permitted
- Publish annual transparency reports
- Challenge overly broad requests
- Disclose only the minimum data necessary
9. Transparency & Reporting
Annual Trust Report
This report is updated annually and published on our website. We provide transparency about:
- Security incidents (if any)
- Compliance certifications and audit results
- Third-party penetration test findings
- Data protection improvements
- Regulatory requests received
Status Page
Real-time system status available at: status.glovair.com
- Current system uptime and performance metrics
- Historical uptime data
- Scheduled maintenance notifications
- Incident history and resolution details
Transparency Reports
We publish transparency reports on:
- Government data requests
- Legal process compliance
- Data breach incidents (if any)
- Security vulnerabilities discovered and patched
10. Third-Party Audits & Certifications
Glovair's security practices are validated by independent third parties:
Annual SOC 2 Type II Audit
Comprehensive audit of security controls, availability, and data confidentiality
Quarterly Penetration Testing
Independent security firm tests for vulnerabilities
Monthly Vulnerability Scanning
Automated scanning for known vulnerabilities
Annual GDPR Compliance Review
External audit of data protection compliance
11. Customer Security Recommendations
Best Practices
- Use Strong Passwords: Minimum 16 characters with mixed case, numbers, and symbols
- Enable 2FA: Activate two-factor authentication on your account
- Regular Updates: Keep your browser and OS updated
- Secure Connection: Always use HTTPS when accessing Glovair
- Privacy Settings: Review and adjust your privacy preferences regularly
- Monitor Activity: Check login history and connected devices
- Report Issues: Contact us immediately if you suspect unauthorized access
Phishing Prevention
- Be cautious of emails asking for passwords or account information
- Verify sender email addresses before clicking links
- Check URLs before entering credentials
- Report suspicious emails to us immediately
- Never share your password or recovery codes
12. Continuous Improvement
Security is an ongoing process. Glovair is committed to:
- Staying current with emerging security threats and best practices
- Investing in security infrastructure and tools
- Regular security audits and assessments
- Expanding compliance certifications (ISO 27001 in 2026)
- Implementing zero-trust security architecture
- Enhancing encryption and data protection measures
- Improving incident response capabilities
- Expanding transparency and public reporting
2026 Roadmap
- ISO 27001 certification
- Advanced threat detection and AI-based monitoring
- Enhanced encryption for at-rest data
- Expanded bug bounty program
- Public security dashboard
- Annual third-party penetration testing reports publication
Contact & Support
For security and privacy concerns:
Security Issues & Vulnerability Disclosure
Response time: 4 hours (24/7 monitoring)
This Trust Report was last updated on January 2, 2026.
Glovair is committed to maintaining and improving these security and privacy standards. This report reflects our current practices and will be updated annually or as significant changes occur.