Always Disclose Logo

Trust Center

Your trust is our foundation.

At a Glance

Hosting

Vercel (Frontend + Edge Functions)

Database

Supabase (PostgreSQL, US-based)

Encryption

TLS 1.3 in transit & hashed+salted at rest

Retention

Draft data stored for 30 days, PIN-secured

PII Storage

No PII stored beyond salted street address

Framework

Next.js 14, React Server Components

Incident Response Policy

Incident Response Policy

AlwaysDisclose.com
Version: 1.0
Last Updated: 2025-06-19

1. Purpose

This policy establishes the process by which AlwaysDisclose.com detects, investigates, contains, communicates, and remediates security incidents that may impact the confidentiality, integrity, or availability of customer data or internal systems, including any exposure of regulated or sensitive information.

2. Scope

Applies to all production systems (Vercel-hosted frontend/backend, Supabase data store, GitHub repository), employee devices, and third-party services that support disclosure workflows or data aggregation.

3. Roles and Responsibilities

  • Incident Commander (IC): Oversees incident response (default: CTO)
  • Security Lead: Coordinates technical investigation
  • Communications Lead: Prepares external/internal statements
  • Legal/DPO: Assesses breach notification obligations
  • External Contacts:
    • Vercel Support
    • Supabase Support
    • Legal Counsel

4. Detection

Incident triggers may include:

  • Alert from Sentry, Supabase audit logs, or Vercel logs
  • Unusual access patterns or rate limits
  • Reports to security@alwaysdisclose.com
  • Suspicious GitHub activity or leaked keys

All alerts are triaged within 30 minutes and, if validated, an incident channel is created in Slack (#inc-YYYYMMDD).

5. Classification

Incidents are assigned severity levels from 0 (informational) to 4 (breach confirmed). Any incident involving unauthorized access to unencrypted PII or disclosure answers, even temporarily, is Level 4.

6. Response Procedures

  • Containment: Revoke affected tokens, firewall IPs, disable routes/functions, disable log exports
  • Eradication: Patch misconfigurations, rotate credentials, restore from known-good deploy
  • Recovery: Deploy verified patch, test system integrity, confirm headers (HSTS, no-store) in place
  • Notification:
    • California residents: “Most expedient time”
    • Other states: ≤ 45 days unless law enforcement delay
    • FTC (if ≥500 affected): Notify within 30 days
    • Future GDPR scope: Notify DPA within 72 hours

7. Post-Incident

Within 5 business days, a full post-mortem is completed, including:

  • Timeline of events
  • Root cause analysis
  • Corrective actions
  • Ticket(s) created and tracked
  • Evidence retained for 12 months
  • Plan updated if gaps were identified

8. Testing and Maintenance

This policy is reviewed annually or after any major incident. A tabletop exercise is conducted at least once per year to validate team readiness and toolchains.


Approved by: Travis French, Founder
Next Review Date: 2026-06-01

Data Flow Diagram

Below is our Level 1 data flow showing how answers move (and where street addresses are salted & hashed, plus our 30-day PIN flow).

Responsible Disclosure

If you discover a security issue in our systems, please email security@alwaysdisclose.com. We’ll acknowledge within 2 business days and keep you updated until it’s fixed.