Security measures and responsibilities
Dyrid mitt uses layered safeguards to protect accounts, records, and service availability.
Application controls
We use signed authentication tokens, password hashing, role-based access checks, and request validation on all protected endpoints.
Infrastructure controls
Production should run with hardened host configuration, network restrictions, dependency updates, and encrypted backups.
Incident handling
Security-relevant activity is logged, and suspicious behavior should be investigated and contained quickly.
User responsibilities
Users must protect credentials, avoid sharing accounts, and report suspicious activity immediately.
Contact about privacy or security
For privacy requests, corrections, deletion requests, or security concerns, contact us directly by email.