Security

Last updated: February 2026

Our Commitment to Security

At Luxia, we follow security best practices to protect your data and maintain the integrity of our platform. We implement multiple layers of security controls across our infrastructure, application, and operational processes.

Data Protection

Encryption

All data transmitted between your browser and our servers is encrypted using industry-standard TLS (Transport Layer Security) protocols. This ensures that your information remains private and secure during transit.

Access Controls

We implement strict access controls based on the principle of least privilege. Only authorized personnel with a legitimate business need can access customer data, and all access is logged and monitored.

Data Retention

We retain your data only as long as necessary to provide our services or as required by law. You can request deletion of your data at any time by following our data deletion instructions.

Infrastructure Security

Our infrastructure is hosted on secure, professionally managed cloud platforms that maintain high security standards. We regularly review and update our security configurations to address emerging threats.

Monitoring and Logging

We maintain comprehensive logging of system activities and security events. Our monitoring systems alert us to suspicious activities, enabling rapid response to potential security incidents.

Incident Response

In the event of a security incident, we have established procedures to:

  • Quickly identify and contain the incident
  • Assess the impact and scope
  • Notify affected users as required by law
  • Implement corrective measures to prevent recurrence

Third-Party Integrations

When integrating with third-party services (such as Meta/Facebook), we use OAuth 2.0 authentication and request only the minimum permissions necessary to provide our services. We do not store your Meta credentials—authentication is handled securely through Meta's official OAuth flow.

Reporting Security Issues

If you discover a security vulnerability or have security concerns, please contact us immediately at:

[email protected]

We take all security reports seriously and will respond within 24 hours.

Continuous Improvement

Security is an ongoing process. We continuously review and improve our security practices to address new threats and maintain the trust you place in us to protect your data.

Contact

For questions about our security practices, please contact us at [email protected].