Security at GhostMyData
Our data removal service keeps your info safe. This is our core promise. We use strong tools to guard your data. You can trust us to do this right.
Good security makes privacy protection work. One needs the other. We put a lot of care into keeping your data safe. When you remove personal information with us, it stays protected.
How We Lock Your Data
Our data removal service locks all data when it moves and when it sits. Your info stays safe at all times. This is key to privacy protection.
**Data in Motion** We use TLS 1.3 for all links. This is the best lock for data in motion. No one can grab your data as it moves. When we remove personal information for you, it travels safely.
**Data at Rest** Stored data uses AES-256. Banks use this same lock. If someone got to our drives, they still can't read it. We swap out keys often to stay safe.
**Full Coverage** From the time you type to when we store it, locks guard your data. There are no weak spots. Your details stay safe the whole way. Our data broker removal process is fully encrypted.
AES-256 Encryption
All data encrypted at rest using AES-256-GCM authenticated encryption with unique initialization vectors per operation.
SOC 2 Infrastructure
Hosted on SOC 2 Type II certified infrastructure (Vercel/AWS). DDoS protection, multi-region redundancy, and automated backups.
Password Safety
Passwords hashed with bcrypt (cost factor 12). Rate-limited login attempts prevent brute-force attacks.
SSN Safety
SSNs hashed immediately with SHA-256 plus unique salt. Never stored, logged, or transmitted in plain text.
Data Protection
Encryption Standards
- At Rest: AES-256-GCM authenticated encryption with unique initialization vectors per operation. Encryption keys stored as environment secrets, isolated from application data.
- In Transit: TLS 1.3 for all connections. HSTS headers enforced. No fallback to older TLS versions.
- Key Safety: Encryption keys stored as environment secrets, separate from application data and database. Access restricted to the production runtime environment.
Authentication Security
- Password Hashing: bcrypt with cost factor 12. Resistant to brute-force and rainbow table attacks.
- Password Requirements: Minimum 8 characters required. Passwords hashed immediately and never stored in plain text.
- Sessions: Secure, HttpOnly cookies with short expiration. Sessions invalidated on suspicious activity.
- Two-Factor Authentication: Optional TOTP-based 2FA with 10 backup codes. Compatible with Google Authenticator, Authy, and other authenticator apps.
- Login Rate Limiting: Failed login attempts are rate-limited to prevent credential stuffing and brute-force attacks.
Sensitive Data Handling
- SSN Protection: SHA-256 hashed with unique salt immediately on input. Plain text never stored, logged, or transmitted.
- Data Minimization: We only collect data necessary for your removal requests. No unnecessary data gathering.
- Auto-Deletion: Temporary data and server logs deleted on schedule (90-day maximum retention).
- PII Masking: All personally identifiable information is masked in error logs and monitoring systems.
Infrastructure Security
Hosting & Network
- Cloud Servers: Hosted on Vercel (SOC 2 Type II certified) with strict physical and logical access controls provided by the infrastructure layer.
- DDoS Protection: Automated mitigation keeps our service running during volumetric and application-layer attacks.
- Network Isolation: Databases in private subnets with no direct internet access. All traffic passes through edge proxies.
- Multi-Region: Data replicated across availability zones. Automatic failover if any region goes down.
Monitoring & Auditing
- 24/7 Monitoring: Continuous monitoring via Sentry (configured with sendDefaultPii: false to protect your privacy).
- Comprehensive Audit Logs: All security events logged with 30+ action types. Logs retained for 365 days.
- Anomaly Detection: Automated systems detect unusual patterns and alert the security team immediately.
- Security Testing: Automated vulnerability scanning and code review on every deployment. We welcome responsible security research via our Vulnerability Disclosure Policy.
Employee Security
- NDAs Required: All employees and contractors sign non-disclosure agreements before accessing any systems.
- Least Privilege: Staff only access data required for their role. Access reviewed quarterly.
- Offboarding: Access revoked immediately on termination. All credentials rotated.
- Security Training: Ongoing security awareness training for all team members.
- Background Checks: All staff pass background checks before hire.
Application Security
- OWASP Top 10: We follow OWASP security guidelines to prevent SQL injection, XSS, CSRF, and other common attacks.
- Input Validation: All user input is validated and sanitized before processing.
- CSP Headers: Content Security Policy headers prevent cross-site scripting and code injection.
- Dependency Scanning: Automated scanning for known vulnerabilities in all dependencies.
- Code Review: All code reviewed for security before deployment. Automated testing on every commit.
Payment Safety
Stripe handles all payments. They are PCI-DSS Level 1 certified — the highest level of payment security.
- No Card Storage: We never store, process, or transmit card numbers. All payment data goes directly to Stripe.
- 3D Secure: We support 3D Secure 2 for additional cardholder verification.
- Fraud Detection: Stripe Radar uses machine learning to detect and block fraudulent transactions.
Compliance & Certifications
Hosted on SOC 2 Type II certified infrastructure (Vercel/AWS)
Payment processing via Stripe (PCI-DSS Level 1 certified)
Full compliance for EU/EEA users
California privacy law compliance
Latest transport layer encryption
HTTP Strict Transport Security enforced
Subprocessor Security
All our subprocessors are contractually bound to maintain equivalent security standards. For the full list of subprocessors and what data they process, see our Privacy Policy.
- Data Processing Agreements (DPAs) with all subprocessors
- Regular security assessment of subprocessor practices
- Encrypted data transfer to and from all subprocessors
Incident Response
We have a documented incident response plan tested regularly:
- 24/7 Response: Our security team is available around the clock to respond to incidents.
- 72-Hour Notification: We notify affected users within 72 hours of confirming a breach (per GDPR Art. 33 and state breach notification laws).
- Root Cause Analysis: Every incident gets a thorough post-mortem with documented findings.
- Continuous Improvement: Lessons from each incident drive security enhancements.
Vulnerability Disclosure
We value security researchers who help us protect our users. If you find a security vulnerability, please report it responsibly.
Security Team: security@ghostmydata.com
We acknowledge reports within 5 business days and do not take legal action against researchers acting in good faith.
Read our full Vulnerability Disclosure PolicyQuestions?
Have questions about our security practices? Email us at security@ghostmydata.com