Trust and security
Security Overview
Mimiqo is designed with risk reduction and customer trust in mind. This page provides a current overview of our approach to security.
1. Access Controls
Access to production systems and customer data is restricted based on role and operational need.
Mimiqo uses account authentication and internal access control mechanisms.
2. Data Protection
Mimiqo applies transport security and operational data protection measures appropriate to the service architecture.
Additional measures may include access logging, secrets management, role restrictions, and vendor-level security configurations.
3. Monitoring and Logging
Mimiqo uses logging and monitoring to support security, service reliability, diagnostics, and incident detection.
4. Backups and Recovery
Mimiqo maintains backup and recovery processes appropriate to the service architecture and vendor setup.
5. Incident Handling
Mimiqo maintains internal processes to identify, investigate, contain, and respond to security incidents.
Where required by law or contractual obligations, Mimiqo will provide appropriate breach notifications.
6. Subprocessors
Mimiqo uses selected subprocessors to operate the service. The current list is available at /legal/subprocessors.
7. Contact
Security and privacy contact: security@mimiqo.co
Privacy contact: privacy@mimiqo.co