Twomiah Software Ventures implements administrative, technical, and organizational safeguards designed to protect the confidentiality, integrity, and availability of customer data across all products and services.

1. Infrastructure Security

Our infrastructure is built on industry-leading cloud providers:

ProviderRoleSecurity Certifications
RenderApplication hosting, PostgreSQL databasesSOC 2 Type II
SupabaseDatabase hosting, authenticationSOC 2 Type II
Amazon Web ServicesFile and media storage (S3)SOC 2, ISO 27001, FedRAMP
CloudflareCDN, DNS, DDoS mitigation, R2 storageSOC 2, ISO 27001

Controls include:

2. Data Encryption

3. Data Isolation

Each customer receives a dedicated, isolated database instance. Customer data is never commingled with another customer's data in the same database. This architecture provides strong isolation and prevents cross-tenant data access.

4. Authentication & Access Control

5. Application Security

6. Monitoring & Logging

7. Vendor Security

All Sub-processors are vetted prior to use and must meet our security and data protection requirements. High-risk vendors (payment processors, healthcare integrations, AI providers) are subject to additional review. A full list is published at twomiah.com/sub-processors.

8. Change Management

9. Backup & Recovery

10. Data Retention

Data TypeRetention Period
Account dataDuration of account + 30 days after cancellation
CRM and business dataDuration of subscription + 30 days for export
Payment records7 years (legal/tax compliance)
Application logs30–90 days
Database backups30 days rolling
Support tickets1–3 years
Call recordings (if enabled)Per account settings, deletable anytime

11. Incident Response

Definition

A "Security Incident" includes unauthorized access to data, data breach or exposure, service disruption due to attack, or loss or compromise of credentials.

Detection

Incidents may be identified through monitoring systems (Sentry), infrastructure alerts (Render), or user reports.

Response Process

Breach Notification

Where required by law (e.g., GDPR Article 33, state breach notification laws):

Post-Incident Review

After resolution, we conduct a root cause analysis and implement preventive measures to reduce the likelihood of recurrence.

12. Responsible Disclosure

If you discover a security vulnerability in any Twomiah product, please report it responsibly to security@twomiah.com. We will acknowledge receipt within 48 hours and work to resolve confirmed vulnerabilities promptly. We ask that you do not publicly disclose vulnerabilities until we have had a reasonable opportunity to address them.

13. Contact

For security-related questions or to report a concern:

Twomiah Software Ventures
Jeremiah Phillips
2607 Beverly Hills Drive
Eau Claire, WI 54701
security@twomiah.com
(715) 864-5052