All data are written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are stored on servers designed with modern techniques to eliminate bottlenecks and points of failure.
All data are written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are stored on servers designed with modern techniques to eliminate bottlenecks and points of failure.
Files you upload to us are stored and encrypted at rest. Our application databases are generally not encrypted at rest because the information you add is actively used within our systems. However, all database backups are encrypted using GPG.
Our servers — from power supplies to internet connections to air purifying systems — operate with full redundancy. Our infrastructure is designed to remain operational even in the event of multiple server failures.
Our state-of-the-art servers are protected by biometric locks and 24/7 interior and exterior surveillance monitoring. Only authorized personnel can access the data center. Around-the-clock onsite staff provides additional protection against unauthorized access and security breaches.
Our software infrastructure is updated regularly with the latest security patches. ChatCut operates on a dedicated network protected by firewalls and continuous monitoring. While perfect security is always evolving, we actively collaborate with security researchers to stay at the forefront of web security.
All credit card transactions are processed with secure encryption—the same level used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network.
We have a dedicated team focused on maintaining your account’s security. Monitoring tools alert us to any suspicious activity targeting our systems. To date, we have never experienced a data breach.
We also audit internal data access. If a ChatCut employee improperly accesses customer data, they will face severe penalties, including termination or prosecution. To our knowledge, this has never occurred.
We have robust processes and defenses in place to maintain our record of zero data breaches. In the unlikely event of a successful attack, we will immediately notify all affected customers.