Security & Trust

Your Security is Our Top Priority

We implement enterprise-grade security measures to protect your data and ensure your trust in our platform.

Security Features

End-to-End Encryption

All data transmission is encrypted using industry-standard SSL/TLS protocols (256-bit encryption).

OAuth 2.0 Authentication

We never store your LinkedIn password. All authentication is handled securely through LinkedIn's OAuth 2.0 protocol.

Secure Data Storage

Your data is stored on enterprise-grade servers with encryption at rest, regular backups, and redundancy.

Privacy by Design

We collect only the minimum data necessary and never sell your personal information to third parties.

Regular Security Audits

We conduct regular security audits, penetration testing, and vulnerability assessments.

Compliance & Certifications

GDPR compliant, CCPA compliant, and following SOC 2 Type II standards.

Our Security Practices

Multi-factor authentication (MFA) available
Role-based access control (RBAC)
Automated threat detection and monitoring
Regular security training for all team members
Incident response plan with 24/7 monitoring
Data backup and disaster recovery procedures
Secure API endpoints with rate limiting
Regular dependency updates and patches

Data Protection & Privacy

What Data We Collect

  • Account information (name, email)
  • LinkedIn profile data (via OAuth)
  • Content you create and schedule
  • Usage analytics and performance data

What We Don't Collect

  • LinkedIn passwords (we use OAuth)
  • Credit card details (handled by Stripe)
  • Private messages or DMs
  • Data from other social media platforms

How We Protect Your Data

  • Encryption in transit and at rest
  • Access controls and authentication
  • Regular security audits
  • Compliance with GDPR, CCPA, and other regulations
  • Secure data centers with physical security

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly:

  • Email: security@reepost.ai
  • Do not publicly disclose the vulnerability before we've addressed it
  • Provide detailed information to help us reproduce and fix the issue
  • Allow us reasonable time to address the vulnerability

We appreciate responsible security researchers and will acknowledge your contribution (unless you prefer to remain anonymous).

Have Security Questions?

Our security team is here to answer any questions you may have

Contact Security Team