1. GCC Compliance
This agreement ensures we comply with local privacy and data protection laws across the Middle East and Gulf Cooperation Council (GCC) member states.2. What Data We Process
- Purpose: Scanning your software for security vulnerabilities.
- What we scan: Code metadata and user account details.
3. Security Protections
- Encryption: Data is encrypted while stored (AES-256) and while moving across the internet (TLS 1.2+).
- Access Control: We use Multi-Factor Authentication (MFA) and strict role-based access limits.

