Security
How we protect your data and our systems. Last updated: February 2025.
Redwood takes the security of our systems and your data seriously. This page outlines our practices and how you can report security concerns.
Data protection
We use industry-standard measures to protect data in transit and at rest, including encryption where appropriate. Access to systems and data is limited to authorized personnel and follows the principle of least privilege.
Infrastructure and access
Our infrastructure is hosted with reputable providers. We apply security updates and monitor for threats. Access to production systems is logged and reviewed.
Reporting vulnerabilities
If you believe you have discovered a security vulnerability, please report it to us responsibly. Contact us at security@redwoodagents.com with a description of the issue and steps to reproduce. We will acknowledge receipt and work with you to understand and address the finding. We ask that you do not publicly disclose the issue before we have had a chance to address it.
Compliance
We aim to align our practices with commonly accepted security and privacy standards. For specific compliance or security questionnaires, contact us at the address below.
Contact
Security inquiries: security@redwoodagents.com. General: https://redwoodagents.com.