Security and privacy controls are configured through your deployment and infrastructure providers.
Multiple layers of protection ensure your data remains secure and private at all times
Traffic between your browser and the application is encrypted in transit using standard TLS.
Workloads run on managed infrastructure. Security controls depend on your hosting configuration and deployment choices.
Data is stored in the configured database provider for your deployment. Access controls and policies are applied where supported.
Authentication and session handling are provided by the configured identity provider (for example, Supabase Auth).
Privacy-first principles: collect only what is needed for the product, and provide controls to manage your data.
Operational monitoring and health checks help surface issues early. Availability characteristics depend on your deployment.
Multi-layered security architecture protecting every aspect of your data
TLS termination and hosting-provider protections
Authentication, authorization, and server-side secrets
Database policies and least-privilege access
Common questions about our security practices
MyRoofGenius is designed with standard security best practices in mind (encryption in transit, access controls, and least-privilege). Exact controls depend on your deployment and provider configuration.
Data is stored in the configured database/storage provider for your deployment (often Supabase). Review your environment configuration for the authoritative source of truth.
Access is controlled by your organization’s users and the permissions/policies configured in your deployment. Support access, if any, should be explicitly authorized and scoped to the minimum needed.
Defense-in-depth: authentication, authorization, provider-level protections, and monitoring. Specific controls and guarantees depend on your hosting and database providers.
You can export your data. Retention and deletion behavior depends on your billing configuration and deployment settings.
Contact support to discuss requirements and request security documentation for your deployment.