29 November 2025
Security Policy
At U Single² (US2), privacy and security come first. We are committed to protecting user data, ensuring safe interactions, and maintaining the highest security standards across our platform.
How We Protect Your Data
- Encryption – User-submitted data is encrypted both in transit and at rest and securely stored in the cloud.
- Role-Based Access Control – Employees receive only the access necessary for their job functions.
- System Logging – Access to our infrastructure and systems is logged and monitored for security purposes.
- Regular Security Assessments – We conduct independent security audits and assessments by experts and third-party firms.
- Bug Bounty Program – Security researchers are encouraged to report vulnerabilities through our Hacker One Bug Bounty Program.
Compliance & Regulatory Standards
- Privacy by Design – We integrate privacy and security protections at every stage of product development.
- Annual Compliance Audits – Independent firms audit our security to ensure regulatory compliance.
- Transparency – Visit our Privacy Policy for more information on how we protect user data.
Reporting Security Issues
U Single² (US2) welcomes input from the security research community. If you discover a
potential vulnerability:
- Submit your findings through our Bug Bounty Program on Hacker One.
- Do not publicly disclose security vulnerabilities until we have confirmed and mitigated the issue.
- Denial of Service (DoS) testing and automated scanning tools are strictly prohibited.
Need Help?
For questions, concerns, or reporting another user, visit our Support & Legal page.
For more information, email us at contact@u-single2.com.

