Legal
Security Policy
Last updated: March 22, 2026 · Effective: March 22, 2026
1. Our Security Commitment
GovEtract handles sensitive government contracting data — including federal business identifiers, proposal content, pricing, and performance records. We take the security of this data seriously and invest continuously in the safeguards described below.
To report a security vulnerability, email security@govetract.com. See Section 9 for our responsible disclosure process.
2. Infrastructure Security
2.1 Hosting and Data Centers
The Platform is hosted using third-party infrastructure providers, including Vercel (application hosting) and Supabase (database, authentication, and storage). These providers publish their own security and compliance materials, and our architecture relies in part on the controls they make available.
2.2 Encryption in Transit
The production Platform is intended to be served over HTTPS using modern TLS protections. We rely on our hosting and network providers to terminate and manage transport security for browser and API traffic.
2.3 Encryption at Rest
We rely on encryption-at-rest and storage-protection capabilities offered by our infrastructure providers for databases, backups, and uploaded files.
2.4 Database Security
Each company's data is isolated at the database level. Company data is accessible only to authenticated users who belong to that company. Isolation is enforced by access policies built directly into the database, not just application code. Your session credentials are cryptographically verified on every request.
3. Application Security
3.1 Authentication
Authentication is handled by Supabase Auth. Session issuance, password handling, and token lifecycle controls are managed through that authentication service and our application-layer access checks.
3.2 Authorization
Access control is enforced at multiple layers, including route protection, server-side checks, and database rules that keep each company's records separate. Even if an application-layer check fails, those database rules are designed to block access across company boundaries.
3.3 Input Validation and Injection Prevention
We validate user input in application code and use managed data-access libraries intended to reduce unsafe query construction and common injection risks. Not every control is identical across every route, and we continue to improve validation coverage over time.
3.4 Dependency Management
We monitor dependencies, review updates, and apply security-related fixes as part of our normal maintenance process. Patch timing depends on severity, exploitability, and operational risk.
3.5 Secrets Management
API keys, database credentials, and other secrets are stored exclusively as environment variables in deployment infrastructure where possible. We do not intentionally expose secrets in client-side code or public source control, and we rotate credentials when operationally necessary or when compromise is suspected.
4. Access Controls
4.1 Principle of Least Privilege
We aim to limit internal access to production systems and customer data to the minimum needed to operate, support, and improve the Platform.
4.2 Multi-Factor Authentication
Where supported by our infrastructure and admin tooling, we use multi-factor authentication and recommend that customers protect their email and related business systems with MFA as well.
4.3 Access Reviews
We review internal access and remove or adjust it when it is no longer required for a person's role or responsibilities.
5. Data Handling
5.1 Data Isolation
Each company's data is logically isolated at the database layer. A user should not be able to access another company's records through the Platform, even if a request is malformed or intentionally manipulated.
5.2 AI Provider Data Handling
When you use AI features, relevant portions of your data are sent to Anthropic or OpenAI to generate responses. We configure and use those services according to the data handling options and contractual terms available to us, and we attempt to send only the context required for the requested output.
5.3 Backup and Recovery
We rely on backup, replication, and recovery features made available by our hosting and database providers. Recovery approaches may change over time as the Platform matures.
5.4 Logging
We maintain access and error logs for security monitoring and debugging. Logs are retained for 90 days. Logs containing personal data are protected with the same access controls as production data. We do not log API keys, passwords, or authentication tokens in plaintext.
6. Monitoring and Incident Response
6.1 Monitoring
We use application logging, infrastructure telemetry, and alerting to help detect service issues, anomalous behavior, and security-relevant events.
6.2 Incident Response
Our incident response process covers detection, containment, investigation, remediation, and post-mortem analysis. In the event of a confirmed security incident:
- We will notify affected customers when required by applicable law or our contractual obligations and when doing so is appropriate in light of the incident.
- Notifications will include the nature of the incident, data categories affected, likely impact, and the remediation steps we are prepared to share at that time.
- We will cooperate with any government or regulatory investigation as required by law.
6.3 Business Continuity
We maintain operational recovery procedures for major infrastructure or service failures, but recovery timelines depend on the nature of the incident and the capabilities of affected third-party providers.
7. Your Security Responsibilities
As a Platform user, you are responsible for:
- Strong credentials: Using a unique, strong password for your GovEtract account and not reusing it across other services
- Account security: Keeping your login credentials confidential and notifying us immediately at security@govetract.com if you suspect unauthorized access
- Device security: Using up-to-date, patched devices and browsers when accessing the Platform
- Authorized access only: Only granting account access to personnel who are authorized to view your company's contracting data
- Document sensitivity: Not uploading classified information, controlled unclassified information (CUI), or documents marked for restricted processing in commercial cloud environments
- Phishing awareness: GovEtract will never ask for your password via email or phone. Treat any such request as fraudulent and report it to us immediately
8. Third-Party Security
We review primary service providers before adoption and periodically thereafter. Security programs and certifications for those providers are described in the providers' own documentation and may change over time.
- Supabase: Database, authentication, and storage infrastructure
- Vercel: Application hosting and delivery
- Anthropic: AI inference services used for selected AI features
- OpenAI: Supplemental AI inference services used for selected features
9. Responsible Disclosure
We welcome security research conducted responsibly. If you discover a potential security vulnerability in GovEtract, please report it to us before disclosing it publicly.
9.1 How to Report
Email security@govetract.com with:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any relevant screenshots, payloads, or proof-of-concept
9.2 Our Commitments
In response to responsible disclosures, we aim to:
- Acknowledge receipt of reports promptly
- Review and triage credible issues in a reasonable timeframe
- Work toward remediation based on severity and operational risk
- Keeping you informed of remediation progress
- Not pursuing legal action against researchers who follow this responsible disclosure process
9.3 Out of Scope
The following are out of scope for our disclosure program:
- Social engineering attacks against GovEtract employees
- Physical attacks against GovEtract offices or infrastructure
- Denial of service testing
- Vulnerabilities in third-party services not controlled by GovEtract (report to the relevant provider directly)
- Issues that require access to another user's account to reproduce
10. Contact
- Security incidents and vulnerabilities: security@govetract.com
- Data breach notifications: privacy@govetract.com