Security & Compliance

Download our security policies, compliance documents, and audit reports. These documents detail how Calimatic Mail protects your data and maintains a secure development lifecycle.

Development

Secure Software Development Lifecycle (SSDLC) Policy

Defines how security is integrated into every phase of software development, from design through deployment and maintenance. Covers secure coding standards, code review, SAST procedures, and deployment security.

PDF
Testing

SAST Report

Static Application Security Testing report covering dependency vulnerability scanning across all packages. Includes findings, risk assessments, remediation actions taken, and scheduled fixes.

PDF
Security

Security Policy

Comprehensive security controls for infrastructure, application, authentication, authorization, encryption, monitoring, and third-party integrations.

PDF
Data

Data Retention & Protection Policy

Defines how user data is collected, stored, protected, retained, and deleted. Includes Zoom and Google-specific data handling, retention periods, and deletion procedures.

PDF
Security

Vulnerability Management Policy

Procedures for identifying, assessing, prioritizing, and remediating security vulnerabilities. Covers dependency scanning, severity classification, response timeframes, and responsible disclosure.

PDF
Operations

Incident Management & Response Policy

Procedures for detecting, responding to, containing, and recovering from security incidents. Includes severity classification, response timelines, containment actions, and post-incident review.

PDF

Questions About Our Security Practices?

Our team is happy to discuss our security controls, compliance posture, or answer any questions about how we protect your data.

Contact Us