Security
Last updated: April 14, 2026
Application controls
- Server-side input validation for contact submissions.
- Output encoding for rendered content.
- Restricted write path for form intake logs.
Access policy
Administrative access to hosting and operational records is limited to authorized team members and protected with role-based controls.
Incident handling
Security-related anomalies are triaged on the same business day. Confirmed incidents are documented with root cause, containment action, and remediation timeline.