Security

Last Updated: This Privacy Policy was last updated on Jun 19, 2024.

At Furcata, we take the security of your data very seriously. We understand that trust is paramount, and we are committed to protecting your information using industry-leading security practices.

Here's an overview of the technologies and practices we use to keep your data safe:

I. Cloud Infrastructure:

  • Google Cloud Platform (GCP): We leverage Google Cloud Platform, a secure and reliable cloud environment that offers robust security features like data encryption at rest and in transit. Google Cloud adheres to stringent compliance standards and undergoes regular security audits.

II. Mobile App Security:

  • Flutter: Our mobile application is built with Flutter, a framework known for its strong security posture. Flutter enforces secure coding practices and helps mitigate common mobile vulnerabilities.

III. Backend Security:

  • Firebase: Firebase, a Google product, powers our backend infrastructure. Firebase offers built-in security features like user authentication and authorization (leveraging Google Sign-in and Apple Sign-in) and cloud functions to securely handle sensitive data.

IV. Communication Security:

  • Twilio: We utilize Twilio for secure communication channels. Twilio's infrastructure is built with robust security measures to safeguard data privacy during communication.

V. Payment Security:

  • Stripe: Stripe, a leading payment gateway, handles all financial transactions within the Furcata app. Stripe adheres to the highest industry standards for payment security, ensuring your financial information remains protected.

VI. Additional Security Measures:

  • Regular Penetration Testing: We conduct regular penetration testing to identify and address any potential security vulnerabilities in our systems.
  • Secure Coding Practices: Our development team adheres to secure coding practices to minimize the risk of introducing vulnerabilities into our codebase.
  • Data Encryption: All sensitive data is encrypted at rest and in transit to ensure confidentiality.
  • Access Controls: We implement strict access controls to restrict access to sensitive data only to authorized personnel.

VII. Your Role in Security:

Since we rely on Google Sign-in, Apple Sign-in, and Phone Sign-in, it's important to ensure the security of your accounts with those providers. Here are some tips to help you keep your data safe:

  • Enable two-factor authentication (2FA) on your Google and Apple accounts for an extra layer of security.
  • Use strong and unique passcodes or passwords for your phone's lock screen and the accounts you use for sign-in.
  • Be cautious about opening suspicious emails or clicking on unknown links.
  • Report any suspicious activity to our security team immediately.

We are constantly working to improve our security posture and stay ahead of evolving threats. We are committed to transparency and will communicate any security incidents promptly.

VIII. CONTACT US

If you have any questions about our security practices, You can contact us: