Security & Compliance
Download our security policies, compliance documents, and audit reports. These documents detail how Calimatic Mail protects your data and maintains a secure development lifecycle.
Secure Software Development Lifecycle (SSDLC) Policy
Defines how security is integrated into every phase of software development, from design through deployment and maintenance. Covers secure coding standards, code review, SAST procedures, and deployment security.
SAST Report
Static Application Security Testing report covering dependency vulnerability scanning across all packages. Includes findings, risk assessments, remediation actions taken, and scheduled fixes.
Security Policy
Comprehensive security controls for infrastructure, application, authentication, authorization, encryption, monitoring, and third-party integrations.
Data Retention & Protection Policy
Defines how user data is collected, stored, protected, retained, and deleted. Includes Zoom and Google-specific data handling, retention periods, and deletion procedures.
Vulnerability Management Policy
Procedures for identifying, assessing, prioritizing, and remediating security vulnerabilities. Covers dependency scanning, severity classification, response timeframes, and responsible disclosure.
Incident Management & Response Policy
Procedures for detecting, responding to, containing, and recovering from security incidents. Includes severity classification, response timelines, containment actions, and post-incident review.
Questions About Our Security Practices?
Our team is happy to discuss our security controls, compliance posture, or answer any questions about how we protect your data.
Contact Us