Security & Compliance

Your trust is our top priority. We're committed to protecting your data with industry-leading security measures.

At PetitLinks, we take security seriously. Our team works around the clock to ensure your data is protected with multiple layers of security.

Our Security Practices

We implement a comprehensive set of security practices to protect your data:

Data Encryption

All data is encrypted both in transit (TLS 1.2+) and at rest (AES-256) to ensure your information remains secure.

Regular Audits

We conduct regular security audits and penetration testing to identify and address potential vulnerabilities.

Secure Infrastructure

Our infrastructure is hosted on industry-leading cloud providers with enterprise-grade security measures.

Team Training

Our team undergoes regular security training to stay updated on best practices and emerging threats.

Compliance

We adhere to industry standards and regulations to ensure your data is handled responsibly and legally.

Compliance Standards

We're committed to meeting and exceeding industry standards for data protection and privacy:

StandardDescriptionStatus
GDPRGeneral Data Protection Regulation (EU 2016/679)Compliant
CCPACalifornia Consumer Privacy ActCompliant
SOC 2Type II CertifiedIn Progress
ISO 27001Information Security ManagementIn Progress

Security is a shared responsibility

While we work hard to secure our platform, security is a shared responsibility. We encourage all users to practice good security hygiene, including using strong, unique passwords and enabling two-factor authentication.

Reporting Security Issues

If you've discovered a security vulnerability, we appreciate your help in disclosing it to us responsibly. Please email our security team at contact@petitlinks.com with details about the issue.

Our Commitment

We're committed to working with security researchers to verify and address any potential vulnerabilities. We'll respond to all legitimate reports and keep you updated as we work on fixes.

Responsible Disclosure

We ask that you:

  • Provide details of the vulnerability, including information needed to reproduce and validate it
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption of our services
  • Give us reasonable time to address the issue before any disclosure to third parties

Last updated: August 23, 2025