Back to Home

Security Policy

This page provides a general overview of Redecta’s security approach. Redecta is designed with a security-focused architecture intended to reduce unnecessary exposure of sensitive data.

Document Type
Security policy
Approach
Security-focused architecture
Priority
Data minimization and protection
The product aims to reduce unnecessary transmission of sensitive data to centralized systems.
Access control, authentication, and operational safeguards are core parts of the security approach.
Appropriate safeguards and encryption mechanisms are applied during data transmission.
A responsible disclosure workflow is supported for potential security issues.

Security Policy

Redecta is designed with a security-focused architecture to reduce accidental exposure of sensitive information.

Local Data Processing

Sensitive information detection is designed to occur primarily in the user browser.

Data Minimization

Redecta collects only the limited information required to provide and secure the service.

Encryption

All network communication is protected with HTTPS encryption.

Authentication

Secure authentication tokens are used for account access and session protection.

Infrastructure Security

Servers and infrastructure are protected with standard operational and security controls.

Responsible Disclosure

If you discover a security issue related to Redecta, please report it responsibly to:

We will review and respond as quickly as possible.

Responsible disclosure and contact

You may share potential security issues or vulnerabilities related to Redecta with us under responsible disclosure principles.

Reports are reviewed by our security team and, where appropriate, we respond within a reasonable timeframe.

Emailsupport@redecta.com

Websitehttps://redecta.com

Addressİstanbul, Türkiye

Last updatedMarch 23, 2026

Scope of applicationGlobal services / local laws and EU users where applicable
Document version:v1.0