security-policy

Security Policy

At U Single² (US2), privacy and security come first. We are committed to protecting user data, ensuring safe interactions, and maintaining the highest security standards across our platform.

How We Protect Your Data

  • Encryption – User-submitted data is encrypted both in transit and at rest and securely stored in the cloud.
  • Role-Based Access Control – Employees receive only the access necessary for their job functions.
  • System Logging – Access to our infrastructure and systems is logged and monitored for security purposes.
  • Regular Security Assessments – We conduct independent security audits and assessments by experts and third-party firms.
  • Bug Bounty Program – Security researchers are encouraged to report vulnerabilities through our Hacker One Bug Bounty Program.

Compliance & Regulatory Standards

  • Privacy by Design – We integrate privacy and security protections at every stage of product development.
  • Annual Compliance Audits – Independent firms audit our security to ensure regulatory compliance
  • Transparency – Visit our Privacy Policy for more information on how we protect user data.

Reporting Security Issues

U Single² (US2) welcomes input from the security research community. If you discover a
potential vulnerability:

  • Submit your findings through our Bug Bounty Program on Hacker One.
  • Do not publicly disclose security vulnerabilities until we have confirmed and mitigated the issue.
  • Denial of Service (DoS) testing and automated scanning tools are strictly prohibited.

Need Help?

For questions, concerns, or reporting another user, visit our Support & Legal page.

For more information, email us at contact@u-single2.com.

Share This Post

Recent Posts

Tags

Follow us

Android Open Source
Previous

Android Open Source

Privacy Request Policy
Next

Privacy Request Policy