Security | Honest Echo

Security

HE Pursuit is designed with a practical, straightforward approach to protecting customer data. We rely on established infrastructure, controlled access, and clear data handling practices to keep information secure.

How We Protect Data

We use commercially reasonable safeguards to protect your information.

  • Data is encrypted in transit and at rest
  • Access to systems is restricted and monitored
  • Infrastructure is hosted on trusted cloud providers

No system is completely secure, but we take data protection seriously and continue to improve our practices over time.

How Your Data Is Used

Your data belongs to you.

  • We do not sell, rent, or share your data
  • We do not use your data to train artificial intelligence or machine learning models
  • Your data is used only to provide and improve the functionality of the platform

Access Controls

HE Pursuit is designed so that users can only access their own data.

  • Access is controlled at both the application and data levels
  • Users cannot view or interact with data from other accounts
  • Systems are monitored for unusual activity

Infrastructure

We use modern cloud infrastructure and service providers to operate the platform.

These providers maintain their own security and compliance programs, which support the overall security of the service.

Data Sensitivity & Use

HE Pursuit is designed for general business use and is not intended for classified or highly sensitive government data.

If your organization has specific security or deployment requirements, contact us to discuss options.

Responsible Disclosure

If you discover a potential security issue, please contact:

security@honestecho.com

We aim to acknowledge reports promptly and address issues in a timely manner. We support responsible disclosure and do not pursue legal action against good-faith researchers.