How AIM Tech AI protects customer data, handles vulnerabilities, and responds to incidents.
1. Our Commitment
We prioritize protecting your data and maintaining the integrity of our systems.
2. Measures
- Encrypted authentication systems
- Access control with least-privilege principles
- Encryption at rest and in transit for sensitive data
- Regular security reviews and dependency scanning
- Incident response procedures with blameless post-mortems
3. Limitations
No system is fully secure. We continuously invest in controls but cannot guarantee perfect security.
4. Reporting Vulnerabilities
If you believe you have discovered a security vulnerability, report it confidentially to security@aimtechai.com. Do not exploit the issue beyond what is necessary to demonstrate it. We commit to acknowledging reports within 48 business hours.
5. Safe Harbor
Good-faith security research conducted within the scope of this policy is authorized and we will not pursue legal action for such research.
Contact
Email: security@aimtechai.com