When using our SORT Application, our users trust us to keep their data secure, private, and available whenever they need it. We take that responsibility seriously.
At SORT, we maintain a security system that:
- Prevents all unauthorized access.
- Supports continuous monitoring for potential vulnerabilities.
- Embraces ongoing, proactive improvement to stay on top of the latest security tools and threats.
We use Mongo DB Atlas servers to save all user data. We make extensive use of their built-in firewalls to protect your data against unauthorized remote access. We use Amazon Web Services (AWS) servers to host the application. AWS by default use built-in firewall to prevent the access to application server by unauthorized user. Data Reliability All user data can automatically backed up on AWS servers with multiple redundant copies.
Account Access
We verify account access through both email/password-based authentication and Google Accounts authentication via OAuth 2.0. When email/password-based authentication is used, we always store individuals passwords with unique salts to add an extra layer of protection to your account.
Alternatively, OAuth provides a seamless way to create and access your account without SortSoftware ever needing to access or store your Google login credentials.
Data Privacy
We make it a priority to be transparent in how we collect, use, and handle your information when you use our website and software. Please see our full privacy policy for more details. Report a Vulnerability If you discover any security vulnerability in SortSoftware, please submit a report and we'll do our best to fix it right away.
SORTSOFTWARE LLC © 2024. All Rights Reserved.