Security

Your data is
protected.

We treat your trading data with the same discipline you apply to managing risk. Here's how we keep it safe.

AES-256 Encryption
All data encrypted at rest using AES-256. All data in transit protected by TLS 1.3.
SOC 2 Compliant Infra
Hosted on AWS infrastructure with SOC 2 Type II compliance and regular third-party audits.
Daily Encrypted Backups
Automatic daily backups retained for 30 days. Point-in-time recovery available on request.
Zero Data Selling
Your trade data is never sold, shared with advertisers, or used to train third-party AI models.
Strict Access Controls
Role-based access controls. No employee can access your data without your explicit consent.
99.9% Uptime SLA
Redundant infrastructure with automatic failover. Status page at status.tradeflowjournal.com.

Found a vulnerability?

We take security reports seriously and appreciate responsible disclosure. If you discover a security vulnerability in TradeFlow Journal, please report it to security@tradeflowjournal.com.

Please include a description of the vulnerability, steps to reproduce, and potential impact. We commit to acknowledging all reports within 24 hours and resolving confirmed issues within 72 hours for critical vulnerabilities.

We do not pursue legal action against researchers who follow responsible disclosure principles.

Report a vulnerability