← Back to home

Security Practices

Last updated: April 15, 2026

1. Encryption

In Transit

At Rest

2. Authentication & Access Control

3. Network Security

4. Data Handling & Segregation

5. Endpoint & Application Security

6. Incident Response

  1. Detection — Monitoring and alerting for anomalous access patterns.
  2. Containment — Immediate token revocation and access isolation.
  3. Notification — Affected users, platform partners, and regulators notified within 72 hours (per GDPR Article 33).
  4. Resolution — Root cause analysis, remediation, and post-incident report.

7. Vulnerability Management

8. Compliance & Certifications

brik.consulting is an early-stage company. We do not currently hold ISO 27001 or SOC 2 certifications. We comply with the GDPR (EU) and CCPA (California) frameworks, and our infrastructure providers maintain the following certifications:

9. Data Deletion & End-of-Contract

Upon termination of a customer relationship or at the request of a platform partner, all collected data is deleted within 30 days. OAuth tokens are revoked immediately upon disconnection.

10. Contact

For security questions or to report a vulnerability:
security@brik.consulting