Security Overview
Last Updated: February 3, 2026
Security is foundational to Ubik. This document describes how we protect your data, our security practices, and how you can help keep your account secure.
1. Our Security Commitment
We take security seriously. Your research data, datasets, and intellectual property deserve protection. We implement industry-standard security measures and continuously improve our security posture.
Our commitments:
- Encryption of data in transit and at rest
- Regular security assessments and penetration testing
- Incident response procedures
- Transparent communication about security issues
- Compliance with applicable regulations
2. Infrastructure & Network
We use enterprise-grade hosting and infrastructure. Authentication and payments are handled by certified third parties. Our setup includes:
- TLS 1.3 for all connections (HTTPS only), HSTS, and certificate transparency
- DDoS protection and Web Application Firewall (WAF) for common attacks
- Rate limiting to prevent abuse
- Provider certifications (SOC 2, ISO 27001) and physical security controls
3. Data Encryption
All data is encrypted in transit (TLS) and at rest (AES-256). Local app data and credentials on your device are protected with encryption and OS secure storage (Keychain/Credential Manager).
4. Application Security
4.1 Secure Development
Code review, static analysis, dependency scanning, and secret scanning are part of our CI/CD pipeline.
4.2 Authentication Security
We use a certified authentication provider, with:
- Multi-factor authentication (MFA) support
- Passwordless options (magic links, passkeys)
- Brute force protection (rate limiting, lockouts)
- Session management (secure tokens, expiration)
- OAuth/SSO integration
4.3 Authorization
Role-based access control, least privilege, API key scoping, and audit logging for sensitive actions.
4.4 Input Validation
We protect against SQL injection, XSS, CSRF, and path traversal via parameterized queries, sanitization, token-based protection, and sandboxing.
5. Desktop Application Security
The desktop app is code-signed on all platforms. Updates are signed and verified; security patches can auto-install. The app runs with minimal privileges, isolates background processes, restricts file access, and protects local data with encryption and OS secure storage. Always download from official sources.
6. Access Controls
We limit internal access with least privilege, need-to-know, and quarterly access reviews. We only access your data when you request support, when investigating security issues, when required by law, or to prevent imminent harm—never for marketing, selling, or training AI models. We maintain audit logs for administrative access, data access, and security events.
7. Third-Party Security
We assess third-party vendors for security certifications, privacy practices, and contractual requirements. We have Data Processing Agreements (DPAs) with all processors handling personal data, ensuring GDPR and other regulatory compliance.
8. Incident Response
We have a documented incident response plan (detection, triage, containment, remediation, recovery). For incidents affecting your data, we notify affected users within 72 hours (critical) or 7 days (high), plus regulatory authorities as required. We disclose what happened, what data was affected, what we're doing about it, and what you should do.
9. Vulnerability Management
We run automated scanning, dependency audits, and annual penetration testing. To report vulnerabilities: email security@ubik.studio with a description, steps to reproduce, and impact. We acknowledge within 48 hours and work to fix valid issues promptly. Do not access other users' data or disclose before we've fixed the issue.
10. Compliance
We design our systems to support GDPR, CCPA/CPRA, and other applicable regulations. Data is stored in the United States by default; Enterprise customers may request data residency and custom DPAs. Contact info@ubik.studio for compliance documentation.
11. Your Security Responsibilities
- Account: Use strong passwords, enable MFA (Settings → Security), don't share credentials, log out on shared devices
- Desktop: Download from ubik.studio or official app stores only; keep the app updated; use device encryption
- Data: Back up important data; review sharing settings; report suspicious activity
- Phishing: We never ask for your password via email or send unexpected attachments. Forward suspicious messages to security@ubik.studio
12. Security Features
All users get MFA, session management, login notifications, and secure password reset. Professional plans add API key management and access logs. Enterprise adds SAML/SSO, custom policies, audit log exports, IP allowlisting, and dedicated security reviews.
13. Frequently Asked Questions
Is my data encrypted? Yes. All data is encrypted in transit (TLS) and at rest (AES-256).
Who can access my data? Only you and those you share with. Ubik employees cannot access your data without your permission or legal requirement.
Do you sell my data? No. We never sell personal data or user content.
What happens if there's a breach? We notify affected users within 72 hours and provide guidance on protective steps.
Is the desktop app safe? Yes. It's code-signed, regularly updated, and uses encryption for local data. Download from official sources only.
Can I request compliance or security documentation? Contact info@ubik.studio. Enterprise customers can request security questionnaires via their account manager.
14. Contact Security Team
For security concerns or to report vulnerabilities:
Security Team: security@ubik.studio
General Support: info@ubik.studio
Website: www.ubik.studio
For urgent security issues, include "URGENT" in the subject line.