Legal
Security Policy
Last updated: February 24, 2026
At Costum, security is a core part of how we build and operate our platform. This page describes the technical and organizational measures we apply to protect your data and ensure the reliability of the service.
1. Data Encryption
- All communication between your browser and our servers is encrypted using TLS 1.2 / 1.3 (HTTPS). Unencrypted HTTP connections are automatically redirected to HTTPS.
- Sensitive data stored in our database (such as passwords) is hashed using a modern, industry-standard algorithm. Passwords are never stored in plain text.
- Authentication tokens are generated with sufficient entropy and are invalidated upon logout.
2. Data Storage
- All user data is stored in a secured, managed database with restricted network access.
- Database access is limited to the application backend. No direct public access is permitted.
- We perform regular automated backups to protect against accidental data loss.
3. Access Controls
- Access to production infrastructure is restricted to authorized team members only, using key-based authentication.
- Internal tools and admin interfaces are not publicly exposed and require strong authentication.
- The principle of least privilege is applied: each service and team member only has access to the minimum required resources.
4. What We Store — and What We Don't
We collect only the data strictly necessary to operate the platform. We do not store:
- Payment card details or financial information (the platform is free during beta).
- Location data or device fingerprints.
- Third-party tracking or analytics data.
We store only your account credentials (name, email, hashed password), a session token for authentication, and the content you create within the application (projects, characters, breakdowns, etc.).
5. Third-Party Data Sharing
We do not sell, share, or disclose your data to any third party for commercial, advertising, or analytical purposes. Infrastructure providers we use (hosting, database) act as data processors under strict contractual obligations and are bound to the same security standards.
6. Incident Response
We have an incident response plan in place to detect, contain, and remediate security incidents:
- In the event of a data breach affecting your personal data, we will notify affected users within 72 hours of becoming aware, as required by GDPR.
- We will also notify the relevant supervisory authority as required by law.
- Post-incident reviews are conducted to prevent recurrence.
7. Vulnerability Disclosure
If you discover a security vulnerability in our platform, we ask that you report it responsibly by emailing support@costum.cloud. Please do not publicly disclose the issue until we have had a reasonable opportunity to address it. We take all reports seriously and will respond promptly.
8. Beta Period
Costum is currently in beta. While we apply the same security standards as a production service, we recommend not storing highly sensitive or business-critical data until the platform reaches general availability. We will communicate any significant security updates to registered users.
9. Contact
For security-related concerns, contact us at support@costum.cloud. For general legal enquiries, use support@costum.cloud.