Security

Security measures and responsibilities

Dyrid mitt uses layered safeguards to protect accounts, records, and service availability.

Version: 1.0 Last updated: March 3, 2026

Application controls

We use signed authentication tokens, password hashing, role-based access checks, and request validation on all protected endpoints.

Infrastructure controls

Production should run with hardened host configuration, network restrictions, dependency updates, and encrypted backups.

Incident handling

Security-relevant activity is logged, and suspicious behavior should be investigated and contained quickly.

User responsibilities

Users must protect credentials, avoid sharing accounts, and report suspicious activity immediately.

Contact about privacy or security

For privacy requests, corrections, deletion requests, or security concerns, contact us directly by email.