Trust Center
Security
Protecting customer data and service integrity is part of our core operating model.
1. Security Program Overview
LEDIX.AI maintains an ongoing security program designed to protect data confidentiality, integrity, and availability through layered technical and operational controls.
2. Data Protection Controls
- Transport-level encryption is used for data in transit.
- Access to sensitive data is restricted through role-based principles.
- Operational safeguards are applied to reduce unauthorized disclosure, alteration, or loss.
3. Identity and Access Management
Internal access is provisioned based on least privilege and reviewed on an ongoing basis. Access events may be logged to support auditability and incident investigations.
4. Monitoring and Incident Response
We monitor production systems for security-relevant signals and maintain incident response procedures for triage, containment, remediation, and post-incident review.
5. Vulnerability Handling
Potential vulnerabilities are assessed based on severity and impact. Remediation is prioritized according to risk. Coordinated security reports can be submitted through our security contact channel.
6. Business Continuity
Backup and recovery practices are used to improve resilience against accidental loss, operational failures, and service disruptions.
7. Shared Responsibility
Customers are responsible for secure account administration, access control configuration, endpoint protection, and credential management within their own environments.
8. Security Contact
For responsible disclosure or security-related questions, contact security@ledix.ai .