Security
How we protect your data
Security is a top priority at Multivio. We understand that you trust us with your social media accounts, content, and business data. We take that responsibility seriously and have implemented comprehensive security measures across every layer of our platform to keep your information safe.
Data Encryption
We use strong encryption to protect your data both at rest and in transit.
- AES-256-GCM encryption for all OAuth tokens and sensitive credentials -- your access tokens are never stored in plaintext
- TLS 1.3 for all data in transit between your browser and our servers
- Encrypted database backups to ensure your data remains protected even in disaster recovery scenarios
Infrastructure
Our infrastructure is built on industry-leading cloud providers with robust security certifications.
- Vercel for frontend hosting with automatic SSL, DDoS protection, and global edge network
- DigitalOcean for media processing services with isolated compute environments
- Supabase for database with row-level security (RLS) policies ensuring users can only access their own data
- Cloudflare for CDN, DDoS protection, and WAF (Web Application Firewall)
Authentication
We implement secure authentication protocols to protect your account and connected social media platforms.
- OAuth 2.0 with PKCE for all platform connections -- the most secure OAuth flow that prevents authorization code interception
- Secure session management with HTTP-only cookies, strict SameSite policies, and automatic session expiration
- Optional two-factor authentication for an additional layer of account security
Access Controls
We enforce strict access controls to minimize exposure of sensitive data.
- Role-based access control (RBAC) with distinct workspace roles: owner, admin, editor, and viewer
- Principle of least privilege -- team members only have access to the features and data required for their role
- Audit logging for administrative actions and sensitive operations
Security Practices
Our development and operations processes are designed with security in mind.
- Regular dependency updates and automated vulnerability scanning across all packages
- Mandatory code review process for all changes before deployment
- Automated security testing integrated into our CI/CD pipeline
- Environment isolation between development, staging, and production
Responsible Disclosure
We value the work of security researchers and welcome responsible disclosure of vulnerabilities. If you discover a security issue, we ask that you:
- Report the vulnerability privately via email before public disclosure
- Provide sufficient detail for us to reproduce and address the issue
- Allow reasonable time for us to address the vulnerability before any public disclosure
Please report security vulnerabilities to: [email protected]
Compliance
We are committed to meeting and exceeding industry compliance standards.
- GDPR-ready -- data processing agreements, right to erasure, data portability, and consent management
- CCPA-compliant -- California Consumer Privacy Act protections including the right to know, delete, and opt-out
- ...SOC 2 planned -- working toward SOC 2 Type II certification to provide third-party assurance of our security controls
Have questions about our security practices? We are happy to provide additional details. Contact our security team at: [email protected]