Security
Policy
How KeCloud protects your data and ensures platform security.
Last Updated: December 4, 2025
1. Our Security Commitment
At KeCloud, the security of your data is our highest priority. We are committed to maintaining a secure environment for our customers and have implemented rigorous physical, technical, and administrative safeguards to protect your information.
2. Data Encryption
We use industry-standard encryption protocols to protect data.
- In Transit: All data transmitted between your browser and our servers is encrypted using TLS 1.2 or higher.
- At Rest: User data stored in our databases is encrypted using AES-256 standards.
3. Access Control
We maintain strict access controls to our infrastructure. Access to customer data is limited to authorized personnel who need it to perform their job functions (e.g., customer support). We utilize multi-factor authentication (MFA) and role-based access control (RBAC) across all our internal systems.
4. Monitoring & Threat Detection
We employ continuous monitoring solutions to detect suspicious activity and potential threats in real-time. Our security team conducts regular vulnerability assessments and penetration testing to identify and address security risks proactively.
5. User Responsibility
While we secure the infrastructure, you play a vital role in security. We encourage all users to:
- Use strong, unique passwords.
- Enable Two-Factor Authentication (2FA) on your KeCloud account.
- Never share login credentials with others.
6. Incident Response
In the unlikely event of a security breach, we have a defined Incident Response Plan. We are committed to notifying affected users and relevant authorities within the timeframes required by applicable laws (such as GDPR) and taking immediate action to mitigate impact.
Report a Vulnerability
If you believe you have found a security vulnerability in KeCloud, please report it to us immediately at:
support@kecloud.com