Security
Security and data protection
This page summarizes how Byter protects user data and handles operational security. It is a practical control summary, not a certification claim.
Control Summary
- Transport encryption (HTTPS/TLS) for client-server communications.
- Role-based access and credential isolation for operational systems.
- Audit logging on critical backend and data operations.
- Regular dependency updates and environment separation between development and production.
Infrastructure and Vendors
Byter relies on third-party infrastructure providers to operate core app services, including authentication and data persistence. Vendor responsibilities and data flows are detailed in the Privacy Policy.
Deletion and Data Access Requests
Users can request account and data deletion at any time. See Delete Account for request requirements and timing.
Incident Reporting
Report security concerns to mani.byter@gmail.com with subjectSecurity Report and include clear reproduction steps.
Last updated: February 18, 2026. For legal terms, read Terms of Service.
