Security
Last updated: February 2026
Our Commitment to Security
At Luxia, we follow security best practices to protect your data and maintain the integrity of our platform. We implement multiple layers of security controls across our infrastructure, application, and operational processes.
Data Protection
Encryption
All data transmitted between your browser and our servers is encrypted using industry-standard TLS (Transport Layer Security) protocols. This ensures that your information remains private and secure during transit.
Access Controls
We implement strict access controls based on the principle of least privilege. Only authorized personnel with a legitimate business need can access customer data, and all access is logged and monitored.
Data Retention
We retain your data only as long as necessary to provide our services or as required by law. You can request deletion of your data at any time by following our data deletion instructions.
Infrastructure Security
Our infrastructure is hosted on secure, professionally managed cloud platforms that maintain high security standards. We regularly review and update our security configurations to address emerging threats.
Monitoring and Logging
We maintain comprehensive logging of system activities and security events. Our monitoring systems alert us to suspicious activities, enabling rapid response to potential security incidents.
Incident Response
In the event of a security incident, we have established procedures to:
- Quickly identify and contain the incident
- Assess the impact and scope
- Notify affected users as required by law
- Implement corrective measures to prevent recurrence
Third-Party Integrations
When integrating with third-party services (such as Meta/Facebook), we use OAuth 2.0 authentication and request only the minimum permissions necessary to provide our services. We do not store your Meta credentials—authentication is handled securely through Meta's official OAuth flow.
Reporting Security Issues
If you discover a security vulnerability or have security concerns, please contact us immediately at:
We take all security reports seriously and will respond within 24 hours.
Continuous Improvement
Security is an ongoing process. We continuously review and improve our security practices to address new threats and maintain the trust you place in us to protect your data.
Contact
For questions about our security practices, please contact us at [email protected].