Last updated: May 13, 2026
Security
At PantoSource ("Company," "we," "us," or "our"), security is foundational to how we build and operate our Services. This page describes the technical and organizational measures we implement to protect Personal Data and Customer Data entrusted to us.
Quick Summary
Encryption: TLS 1.2+ in transit, AES-256 at rest
Access Controls: Role-based access, multi-factor authentication, least-privilege principles
Infrastructure: Hosted on industry-leading cloud providers in the United States
Monitoring: Continuous logging, alerting, and security assessments
Incident Response: Documented procedures with 72-hour breach notification
Contact: Report security issues to security@pantosource.com
Data Encryption
1.1 Encryption in Transit
All data transmitted between Customers, end-users, and our Services is encrypted using TLS 1.2 or higher. This includes API calls, dashboard access, and webhook deliveries.
1.2 Encryption at Rest
Personal Data and Customer Data stored on our infrastructure is encrypted at rest using AES-256 encryption.
1.3 Key Management
Encryption keys are managed using industry-standard key management services with rotation, access logging, and separation from encrypted data.
Access Controls
2.1 Role-Based Access Control (RBAC)
Access to systems and data is granted based on job function and the principle of least privilege. Employees are granted only the access necessary to perform their responsibilities.
2.2 Multi-Factor Authentication (MFA)
All administrative access to production systems requires multi-factor authentication.
2.3 Access Reviews
We periodically review user access rights to ensure that access remains appropriate. Access is revoked promptly when no longer needed.
2.4 Audit Logging
Access to production systems and Personal Data is logged. Logs are retained and monitored for unauthorized or unusual activity.
Infrastructure Security
3.1 Cloud Hosting
Our Services are hosted on industry-leading cloud infrastructure providers in the United States. These providers maintain physical security controls including:
24/7 monitored access controls
Biometric authentication for facility entry
Environmental controls (fire suppression, climate control, power redundancy)
Compliance with major standards (e.g., SOC 2, ISO 27001)
3.2 Network Security
We implement multiple layers of network security including:
Firewalls and network segmentation
DDoS protection
Intrusion detection and prevention systems
Virtual private cloud (VPC) isolation
3.3 Application Security
Our applications are built with security best practices, including:
Secure software development lifecycle (SDLC)
Code reviews and static analysis
Regular dependency updates and vulnerability scanning
Protection against common vulnerabilities (e.g., OWASP Top 10)
Data Backup and Recovery
4.1 Backups
We maintain regular backups of Customer Data to enable recovery in the event of system failure or data loss.
4.2 Disaster Recovery
We have documented disaster recovery and business continuity plans designed to minimize service disruption and data loss.
Monitoring and Incident Response
5.1 Continuous Monitoring
We maintain continuous monitoring of our systems for security events, performance issues, and unauthorized activity. Alerts are escalated to on-call personnel as appropriate.
5.2 Incident Response Plan
We maintain a documented incident response plan that includes:
Detection and analysis
Containment and eradication
Recovery and lessons learned
Communication with affected parties
5.3 Breach Notification
In the event of a Personal Data breach, we will notify affected Customers without undue delay and in any event within seventy-two (72) hours of becoming aware of the breach, in compliance with applicable laws.
Employee Security
6.1 Background Checks
Where permitted by law, we conduct background checks on employees with access to sensitive systems or data.
6.2 Security Training
All employees receive security and data protection training upon hire and annually thereafter.
6.3 Confidentiality
All employees and contractors are bound by confidentiality obligations.
Vendor Security
We assess the security practices of our vendors and Sub-processors before engagement, and require them to maintain data protection standards consistent with our own. See our Sub-processors page at https://pantosource.com/sub-processors for details.
Compliance
8.1 Data Protection Laws
We design our Services and security practices to comply with applicable data protection laws, including:
The EU General Data Protection Regulation (GDPR)
The UK GDPR
The California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA)
Other U.S. state privacy laws (Colorado, Connecticut, Virginia, Utah, and others)
8.2 Certifications
We are working toward formal certifications including SOC 2 Type II. Updates will be reflected on this page as they become available.
Customer Responsibilities
Security is a shared responsibility. To help protect your account and data, we recommend:
Using strong, unique passwords for your PantoSource account
Enabling multi-factor authentication where available
Limiting and reviewing user access regularly
Reporting suspicious activity to security@pantosource.com
. Reporting Security Issues
If you discover a security vulnerability or suspect a security incident, please report it to:
Email: security@pantosource.com
We appreciate responsible disclosure and will work with researchers to verify, address, and acknowledge legitimate findings.
. Contact
For general security inquiries:
Address: 2333 Brickell ave D1 #36 Miami FL 33129
Email: security@pantosource.com
For privacy-related inquiries: privacy@pantosource.com