Security is not an afterthought at Tamperline.us — it’s foundational. Your brewery’s inventory data, customer records, and business information are protected by industry-standard security practices. Here’s exactly how we keep your data safe.
Our Commitment
We are committed to maintaining the confidentiality, integrity, and availability of your business data. This page describes our current security practices. We continuously improve our security posture and will update this page when significant changes are made.
Data Encryption
- Data is sent over HTTPS in supported environments
- Passwords are hashed using bcrypt before storage
- Authenticated API requests are required for account-specific data access
- Sensitive service configuration is kept outside the public frontend where possible
- Billing is handled through a managed third-party billing provider
Access Control
- Authenticated access is required for account-specific dashboard data
- Signed JWTs are used for session-based API access
- Users can update passwords and delete their accounts from the product
- Plan rules restrict access to paid analytics pages
- API responses are scoped to the authenticated account where applicable
Infrastructure & Hosting
Tamperline.us runs on managed web and database services. Specific vendors and deployment details may change over time as the platform evolves.
- Separate frontend and backend application layers
- Authenticated API routes for account data and billing actions
- Managed billing through a third-party billing provider
- Application errors may be logged for troubleshooting and support
- Dependencies and service configuration are reviewed during updates
Compliance
- We aim to support applicable privacy and data-handling requirements for our users
- Privacy, terms, and support documentation are available publicly on the site
- Business users can contact us to discuss data-handling requirements
- Account holders can request profile updates, exports, and account deletion from the product
- We do not sell your data to third parties — ever
Vulnerability Reporting
We take vulnerability reports seriously and appreciate responsible disclosure.
- Email: ravi@tamperline.us
- Include: Description of the issue, steps to reproduce, potential impact
- Response time: We will acknowledge within 48 hours
- We do not currently operate a bug bounty program but recognize reporters publicly (with permission)