Security Policy

Last Updated: February 6, 2025

Report Security Issues

For urgent security concerns or to report vulnerabilities, please contact:

[email protected]

At Sojooo ("we," "our," or "us"), we are committed to maintaining the highest levels of security for the protection of your personal data, ensuring the integrity and availability of our systems, and fostering a secure online environment for all of our users. This Security Policy outlines the practices and procedures we have implemented to safeguard our platform, users, and content, and explains how we engage with white-hat security experts to continuously enhance the security of our services.

1. Introduction

We recognize that security is paramount to maintaining trust and confidence with our users. This policy defines how we safeguard sensitive information, prevent unauthorized access, and ensure that our platform is protected against security breaches. By using our services, you agree to abide by the terms outlined in this policy.

2. Information Security Practices

Our approach to security is comprehensive, addressing multiple layers of protection to safeguard both user data and platform infrastructure. This includes technical, physical, and administrative safeguards, such as:

  • Data Encryption: We use strong encryption (e.g., AES-256, TLS 1.2 or higher) to protect sensitive data in transit and hash passwords with Argon.
  • Access Control: Only authorized personnel have access to sensitive data and systems. We enforce least privilege access, ensuring that employees and contractors have access only to the information necessary for their roles.
  • Authentication: We utilize multi-factor authentication (MFA) to strengthen user authentication and reduce the risk of unauthorized account access.
  • Vulnerability Management: We perform regular vulnerability assessments and penetration testing to identify and mitigate potential security risks in our systems.
  • Incident Response: In the event of a security incident, we have a robust incident response plan in place to quickly contain, investigate, and mitigate the issue, minimizing potential harm to our users.

3. White-Hat Security Program

We believe in the proactive identification and resolution of security vulnerabilities, which is why we have established a White-Hat Security Program to engage ethical hackers and security researchers. Our program encourages the responsible disclosure of vulnerabilities, helping us improve the security posture of our platform.

3.1 Reporting Security Issues

If you discover a potential security vulnerability, please follow these steps:

  • Report the Issue: Email us at [email protected] with a detailed description of the vulnerability, steps to reproduce, and any relevant supporting information.
  • Confidentiality: We request that you do not disclose any findings to the public before we have had the opportunity to investigate and address the issue.
  • No Disruption: We ask that any testing or validation be conducted in a manner that does not disrupt our platform, services, or other users.

3.2 Program Benefits

  • Recognition: We will publicly acknowledge contributors who responsibly disclose vulnerabilities.
  • Bounties: Depending on the severity of the issue, we may offer a reward for responsible disclosure through our Bug Bounty program. Rewards are determined on a case-by-case basis.
  • Exclusive Updates: We may provide early access to security-related updates or patches for recognized researchers.

4. Data Protection

We take the protection of your personal data seriously and have implemented measures to ensure that any personal information you provide is kept secure. This includes:

  • Data Minimization: We collect only the personal data necessary to provide our services, and we store it only for as long as necessary.
  • Privacy by Design: We integrate privacy and security considerations into the design and development of our platform.
  • Compliance with Regulations: We comply with applicable data protection laws, including the GDPR, CCPA, and others, to ensure that your data is handled with the highest standards of protection.

5. Secure Development Practices

  • Code Reviews: We conduct peer code reviews and static analysis to identify and address potential security flaws before code is deployed.
  • Third-Party Dependencies: We rigorously vet any third-party software or libraries we integrate into our platform to ensure they meet our security standards.
  • Security Training: Our developers undergo regular training to stay up to date with the latest security best practices and threats.

6. Physical Security

  • Data Center Security: Our servers and infrastructure are housed in secure, certified data centers with multi-layered access control systems and surveillance.
  • Disaster Recovery and Backup: We maintain regular backups and implement disaster recovery procedures to ensure business continuity in the event of a data loss incident.

7. Monitoring and Auditing

  • Real-time Monitoring: We utilize advanced monitoring tools to detect unauthorized access or anomalies within our systems.
  • Logging: We maintain detailed logs of system activity to support security audits and investigations.
  • Regular Audits: We conduct regular security audits to assess the effectiveness of our security policies and procedures.

8. User Responsibilities

As a user of our platform, you also have a responsibility to ensure the security of your account. We encourage the following best practices:

  • Use Strong Passwords: Ensure your password is strong, unique, and not reused across multiple platforms.
  • Enable Multi-Factor Authentication (MFA): We strongly encourage you to enable MFA for additional protection of your account.
  • Monitor Your Account: Regularly review your account activity and report any suspicious activity to us immediately.

9. Limitations of Liability

While we take every measure to ensure the security of our platform, no system can be completely immune to vulnerabilities. As such, we cannot guarantee absolute security. By using our platform, you agree that we are not liable for any damages, losses, or disruptions arising from security breaches or vulnerabilities.

10. Security Policy Updates

We reserve the right to update this Security Policy from time to time to reflect changes in our security practices or legal requirements. We will notify users of significant changes through email or by posting an updated policy on our website. We encourage you to regularly review this policy to stay informed about how we are protecting your information.

Contact Us

If you have any questions or concerns about our Security Policy or wish to report a security vulnerability, please contact us at:

Email: [email protected]

Address:
17000 S Vermont Ave
Unit A
Gardena, CA 90247
United States