The R0 app is in beta now, click the button to request access.   

Security measures

Last updated June 18, 2023

At R0, we place utmost importance on the security of our users' data. We have implemented a comprehensive set of security measures to safeguard your information and protect your privacy.

Data encryption

We employ strong encryption protocols to ensure the confidentiality and integrity of your data. This includes encrypting data both during transit and while at rest. By employing encryption algorithms that adhere to industry standards, we effectively thwart unauthorized access and fortify an additional layer of protection against potential threats.

Secure Key and Secret Storage

We employ robust infrastructure to securely store keys and secrets. These sensitive pieces of information are safeguarded using industry best practices, including strong encryption and access controls. By implementing secure storage mechanisms, we minimize the risk of unauthorized access and ensure the confidentiality of your data.

Code Review and Testing

Every change made to our codebase undergoes a thorough peer review process. This practice helps identify potential security vulnerabilities and ensures that all modifications meet our rigorous quality and security standards. Additionally, all code changes must pass a series of tests before being deployed to our production environment, ensuring that only reliable and secure code is released.

Partner Security Standards

We understand the importance of maintaining a secure ecosystem. Therefore, we carefully assess and verify the security practices of our partners to ensure they meet our stringent security standards. By establishing these requirements, we create a secure environment that extends beyond our own infrastructure, protecting your data as it interacts with our partners.

Vendor/PARTNER Data Access Limitation

We adhere to the principle of least privilege, acknowledging the necessity to control and restrict access to sensitive data. To accomplish this, we meticulously manage and impose strict limitations on the data accessible to our vendors.

OWASP Guidelines

Our security practices are aligned with the Open Web Application Security Project (OWASP) guidelines. These guidelines provide industry-accepted best practices for ensuring the safety of web applications. By following OWASP's recommendations, we proactively address common web application security risks and continually enhance the security of our platform, protecting our users from potential threats.

CONTACT US

If you have any questions, comments, or feedback about our security practices, please contact R0 Software Inc. at:

R0 Software Inc.
‍50 W Broadway
Suite 333
Salt Lake City, UT 84101
‍United States
security@r0app.com