Phenicie Business Management Logo

Security & Incident Response

Effective date: 2025-10-10

Overview

We apply best practices for securing data, including encryption in transit, role-based access controls, logging, and vulnerability management. Incidents are triaged and communicated promptly per contractual SLAs.

Reporting a vulnerability

Email tech@phenicie.com. Please include reproduction steps. We appreciate coordinated disclosure.

Incident communication

We notify designated contacts about confirmed incidents affecting your data with outline, scope, mitigations, and next steps.