uLog logo uLog

Security Policy

We prioritize confidentiality, integrity, and availability of user data.

Infrastructure

Hosted on reputable cloud providers with hardened managed services and network segmentation.

Encryption

Access Control

Role‑based access with MFA enforced for administrative accounts.

Vulnerability Management

Regular dependency scanning & patching; critical fixes prioritized.

Incident Response

Defined escalation workflow; post‑incident reviews for improvement.

Responsible Disclosure

Report suspected issues to security@ulog.ai. We appreciate coordinated disclosure.