Security at Tecsaro AI

Last updated: January 2026

At Tecsaro AI, protecting your data, website connections, and account is a top priority. We have built our platform with security in mind from day one and follow industry-standard best practices to keep your information safe.

1. Secure Infrastructure

Our platform is hosted on secure cloud infrastructure with:

  • Encrypted network communication (HTTPS / TLS)
  • Firewall protection
  • Isolated environments
  • Continuous monitoring
  • Regular system updates

2. Data Protection

We protect your data using:

  • Encryption in transit
  • Secure storage
  • Limited internal access
  • Role-based permissions
  • Logging and monitoring of access

Only authorized team members can access production systems, and access is reviewed regularly.

3. Account Security

We take account security seriously:

  • Passwords are encrypted and never stored in plain text
  • Secure authentication methods are used
  • Session timeouts are enforced
  • Suspicious activity is monitored

Users are responsible for keeping their login credentials secure.

4. Payment Security

All payments are processed securely by Razorpay.

  • We never store card or bank details
  • Payment processing is PCI-DSS compliant
  • Secure tokens are used for transactions

5. Website Crawling Safety

When you connect a website for crawling:

  • We only access publicly available content
  • No login credentials are stored for your website
  • Crawl data is stored securely and used only for analysis
  • You can disconnect your website and request data deletion at any time

6. AI Tracking & Data Processing Security

For AI visibility tracking features:

  • Only required prompt and content data is sent to AI providers
  • Your data is not used to train public AI models
  • Processing is temporary and purpose-limited
  • We follow strict access controls for AI operations

7. Backups & Reliability

We perform:

  • Regular automated backups
  • Secure backup storage
  • Recovery procedures for critical systems
  • Monitoring for system health and uptime

8. Responsible Disclosure

If you discover a security vulnerability, please report it responsibly to:

[email protected]

We take all reports seriously and will investigate promptly.

9. Security Updates

We continuously improve our security practices. This page may be updated as our platform evolves.

Contact

For security-related questions, contact us at:

[email protected]