Security & Data Protection
Effective Date: 26/03/2026
Chronosense is designed to provide structured compliance monitoring while maintaining appropriate safeguards for organizational data.
This page outlines the security and data protection measures applied within the platform.
1. Access Controls
Access to the Chronosense platform is protected through multiple layers of authentication and security controls:
Secure account login with token-based session management (JWT)
Mandatory email verification on account creation — accounts cannot be activated until the registered email address is confirmed
Strong password policy — passwords must be a minimum of 12 characters and meet complexity requirements; password age is tracked and expiration is enforced
Optional two-factor authentication (2FA) — users may enable SMS-based one-time codes for an additional layer of account security
Bot protection on the registration flow, implemented via Cloudflare Turnstile
Rate limiting applied to authentication endpoints to mitigate brute-force attempts
2. Organizational Data Segregation
Chronosense enforces organization-level data separation. Each subscription operates as an isolated organization. Users may only access data associated with their own organization. Cross-organization data access is not permitted at any level of the platform.
3. Team Access & Onboarding
Organizations can invite team members via a secure invitation code system. Invitation codes carry an expiry period and are invalidated after use, preventing reuse or unauthorized access via stale links.
Once onboarded, team members are assigned one of the following roles:
Owner — full administrative access, including the ability to manage members and organization settings
Member — access to compliance tools and data within the organization, without administrative permissions
Owners are responsible for managing internal access and ensuring that roles reflect current personnel.
4. Document Storage
Compliance documents and submission packets generated within the platform are stored in encrypted cloud storage provided by Amazon Web Services (S3). Documents are retained with version history — prior submissions are never overwritten, ensuring a complete and unalterable record is maintained.
5. Audit & Activity Logging
All significant compliance actions within the platform are recorded with a timestamp and the identity of the acting user. This provides a full auditable trail that can be referenced in the event of regulatory scrutiny or internal review.
Alert records are append-only. Escalation events create new records rather than modifying existing entries, preserving the integrity of the compliance history. Alerts remain open until explicitly acknowledged by an authorized user.
6. Infrastructure & Service Providers
Chronosense utilizes the following third-party providers to support secure service delivery:
Hetzner — platform hosting and infrastructure
Amazon Web Services (S3) — encrypted document and compliance packet storage
SendGrid — transactional email delivery
Twilio — SMS delivery and two-factor authentication
Stripe — subscription billing and payment processing
Cloudflare — bot protection and traffic management
Each provider operates under its own security and compliance frameworks. Links to their respective security documentation are available on their websites.
7. Data Protection Principles
Chronosense operates in accordance with the following data protection principles:
Data minimization — only data necessary for operating the platform is collected and retained
Organizational access control — data is strictly scoped to the organization it belongs to
Controlled notification delivery — alerts and notifications are delivered only to verified contacts within an organization
Protection against unauthorized access — enforced through authentication controls, session management, and role-based permissions
Personal data is processed only for the purposes of operating and improving the platform.
8. Account & Data Deletion
Users may request deletion of their account at any time. Upon deletion, associated personal data is removed in accordance with the platform's data retention practices. Organizations wishing to request removal of their organizational data should contact support directly.
9. Incident Response
Chronosense maintains internal procedures for identifying and responding to suspected security incidents. Where required by applicable law, affected users will be notified of material security incidents in a timely manner.
10. User Responsibilities
Users are responsible for:
Maintaining the confidentiality of their login credentials and any active session
Enabling two-factor authentication where appropriate for their security requirements
Managing internal access within their organization, including promptly revoking access for departing team members
Ensuring that authorized personnel are assigned appropriate roles
11. Limitations
While Chronosense implements the safeguards described on this page, no system can guarantee absolute security. Users acknowledge that use of online services carries inherent risk.
12. Contact
If you have security-related questions or concerns, please contact:
Email: support@chronosenseapp.com
