How we protect your data
Last updated: November 21, 2025
This Security Policy describes Netrows security program and technical and organizational security controls to protect customer data from unauthorized use, access, disclosure, or theft and safeguard the Netrows services. As security threats change, Netrows continues to update its security program and strategy to help protect customer data and Netrows services. As such, Netrows reserves the right to update this Security Policy from time to time; provided, any update will not materially reduce the overall protections stated in this Security Policy.
Risk-based security framework
Netrows maintains a risk-based security assessment program. The framework for Netrows security program includes administrative, organizational, and technical safeguards designed to protect Netrows services and confidentiality, integrity, and availability of customer data. Netrows security program is intended to be appropriate to the nature of the Netrows services and the size and complexity of Netrows business operations.
Contractual obligations and internal policies
All Netrows employees and contract personnel are bound by contractual agreements and Netrows internal policies regarding maintaining the confidentiality of customer data and are contractually obligated to comply with these obligations.
Security training and best practices
All Netrows employees must complete a security and privacy training which covers Netrows security policies, security best practices, and privacy principles. All application passwords must be saved on a password manager. Each service must have its unique password. When available, two-factor authentication (2FA) must be enabled. When available, by using a physical key. Otherwise, by using a 2FA application. SMS 2FA is not allowed.
Vendor assessment and agreements
Netrows may use third party vendors to provide certain services. Netrows carries out a security risk-based assessment of prospective vendors before working with them to validate they meet Netrows security requirements.
Netrows enters into written agreements with all of its vendors which include confidentiality, privacy, and security obligations that provide an appropriate level of protection for customer data that these vendors may process.
Enterprise-grade infrastructure
The Netrows services are hosted on Vercel Edge Network with global CDN distribution. Customer data transmitted through Vercel is encrypted in transit using TLS 1.3. Vercel provides automatic DDoS protection and enterprise-grade security. More information about Vercel security is available at https://vercel.com/docs/security.
The Netrows database is hosted on Supabase, a SOC 2 Type II certified platform. Customer data stored within Supabase is encrypted at rest using AES-256 encryption. Supabase does not have access to unencrypted customer data. More information about Supabase security is available at https://supabase.com/docs/guides/platform/security.
Databases are not open to the world: any connection from a disallowed IP address will be rejected. Only connections from authorized Netrows services are allowed. When possible, data is pseudonymized. OAuth and refresh tokens are stored encrypted, using the AES-256-CBC algorithm. Passwords are stored encrypted, using the bcrypt function with cost factor 10. API keys are hashed using bcrypt before storage.
For the Netrows services, all network access between production hosts is restricted, using access control lists to allow only authorized roles to interact in the production network. Access control lists are in use to manage network segregation between different security zones in the production and corporate environments. Access control lists are reviewed regularly.
Proactive security measures
Netrows follows security by design principles when it designs the services. This includes, the performance of internal security reviews before deploying new services or code; penetration tests of new services by independent third parties; and regular scans to detect potential security threats and vulnerabilities.
Least privilege and role-based access
To minimize the risk of data exposure, Netrows follows the principles of least privilege through a role-based-access-control model when provisioning system access. An employee's access to customer data is promptly removed upon termination of their employment. In order to access the production environment, an authorized user must have a unique username and password and multi-factor authentication enabled. Netrows logs high risk actions and changes in the production environment. By default, links holding data (password reset, email change, email validation, etc.) are encrypted using the AES-256-CBC algorithm. We leverage automation to detect any deviation from our internal technical standards such as malicious usage.
Users cannot create an account on Netrows using a compromised password from the haveibeenpwned.com database. All passwords are hashed using bcrypt with cost factor 10 before storage.
All database tables implement Row Level Security (RLS) policies to ensure users can only access their own data. Database-level access control provides an additional layer of security beyond application-level checks.
API endpoints are protected with rate limiting (20 requests per minute per user account) to prevent abuse and ensure fair usage. Rate limits are enforced at the user level, not per API key.
The following logs of actions are stored:
Proactive security measures
Netrows maintains controls to mitigate the risk of security vulnerabilities by using third-party tools to conduct vulnerability scans regularly to assess vulnerabilities in Netrows infrastructure and systems. Critical software patches are evaluated, tested, and applied proactively. Dependencies are updated regularly for security patches, and automated vulnerability scanning is performed on every deployment.
Automated backup and recovery
Netrows performs the following backups of its data:
Data protection in transit and at rest
All data transmitted between clients and Netrows services is encrypted using TLS 1.3, the latest and most secure version of the Transport Layer Security protocol. This ensures that all API requests, responses, and authentication tokens are protected from interception.
All customer data stored in our database is encrypted at rest using AES-256 encryption, a military-grade encryption standard. API keys are hashed using bcrypt with cost factor 10 before storage. OAuth and refresh tokens are encrypted using the AES-256-CBC algorithm. Sensitive data is never stored in plain text.
PCI-DSS compliant payment processing
Netrows uses Stripe, a PCI Level 1 certified payment processor, for all payment processing. We never store or have access to your payment card details. All payment information is handled directly by Stripe with 3D Secure authentication and automatic fraud detection via Stripe Radar.
Report security vulnerabilities
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly:
Email: security@netrows.com
Please include detailed steps to reproduce the issue. We commit to:
Industry standards and regulations
Netrows complies with industry standards and regulations:
GDPR Compliant
EU data protection regulation
SOC 2 Type II
Via Supabase infrastructure
PCI-DSS Level 1
Via Stripe payment processing
ISO 27001
Information security management
For questions about our security practices, please contact us at security@netrows.com.