Trust

Security

How we protect your data and keep Qcom reliable. For how we use personal data, see our Privacy Policy.

Last updated — April 9, 2026

Overview

Qymmo is built so your customer data stays protected in transit and at rest. We follow industry practices for encryption, access control, and monitoring, and we continually improve our security posture as the product evolves.

Encryption & data

Connections to our services use TLS. Sensitive data is encrypted at rest where supported by our infrastructure. We limit access to production systems and customer data to authorised personnel who need it to operate the service.

Infrastructure

We host on reputable cloud providers with physical and network safeguards. We apply patches, monitor availability, and use backups and redundancy to reduce the risk of data loss and downtime.

Access & authentication

Your team signs in through secure sessions. We encourage strong passwords and, where available, additional account protections. Administrative actions are logged where appropriate for auditing and troubleshooting.

Compliance

We design processes to support common privacy and security expectations. Specific certifications or regional requirements may apply to your use case — contact us if you need detailed assurance for procurement or regulated industries.

Reporting issues

If you discover a vulnerability or security concern, please report it responsibly. Email security@qymmo.com with enough detail for us to reproduce or assess the issue. We appreciate coordinated disclosure.