Trust and security

Security Overview

Mimiqo is designed with risk reduction and customer trust in mind. This page provides a current overview of our approach to security.

1. Access Controls

Access to production systems and customer data is restricted based on role and operational need.

Mimiqo uses account authentication and internal access control mechanisms.

2. Data Protection

Mimiqo applies transport security and operational data protection measures appropriate to the service architecture.

Additional measures may include access logging, secrets management, role restrictions, and vendor-level security configurations.

3. Monitoring and Logging

Mimiqo uses logging and monitoring to support security, service reliability, diagnostics, and incident detection.

4. Backups and Recovery

Mimiqo maintains backup and recovery processes appropriate to the service architecture and vendor setup.

5. Incident Handling

Mimiqo maintains internal processes to identify, investigate, contain, and respond to security incidents.

Where required by law or contractual obligations, Mimiqo will provide appropriate breach notifications.

6. Subprocessors

Mimiqo uses selected subprocessors to operate the service. The current list is available at /legal/subprocessors.

7. Contact

Security and privacy contact: security@mimiqo.co

Privacy contact: privacy@mimiqo.co

Last updated: March 30, 2026