Security Overview
Last Updated: February 3, 2026
Security is foundational to Ubik. This document describes how we protect your data, our security practices, and how you can help keep your account secure.
1. Our Security Commitment
We take security seriously. Your research data, datasets, and intellectual property deserve protection. We implement industry-standard security measures and continuously improve our security posture.
Our commitments:
- Encryption of data in transit and at rest
- Regular security assessments and penetration testing
- Incident response procedures
- Transparent communication about security issues
- Compliance with applicable regulations
2. Infrastructure Security
2.1 Cloud Infrastructure
Our web platform is hosted on enterprise-grade infrastructure:
| Component | Provider | Security Features |
|---|
| Web Hosting | Vercel | Edge network, DDoS protection, SOC 2 |
| Database | AWS RDS | Encryption, automated backups, VPC isolation |
| File Storage | AWS S3 | Server-side encryption, access logging |
| Authentication | Clerk | SOC 2, GDPR compliant |
| Payments | Stripe | PCI DSS Level 1 |
2.2 Network Security
- TLS 1.3 for all connections (HTTPS only)
- HSTS (HTTP Strict Transport Security) enabled
- Certificate transparency monitoring
- DDoS protection via CDN edge network
- Web Application Firewall (WAF) for common attacks
- Rate limiting to prevent abuse
2.3 Data Center Security
Our infrastructure providers maintain:
- SOC 2 Type II certification
- ISO 27001 certification
- Physical security controls (biometrics, 24/7 monitoring)
- Redundant power and cooling
- Geographic redundancy
3. Data Encryption
3.1 Encryption in Transit
All data transmitted between you and Ubik is encrypted:
| Connection | Encryption |
|---|
| Web browser → Servers | TLS 1.3 |
| Desktop app → Servers | TLS 1.3 |
| API requests | TLS 1.3 |
| Internal services | mTLS |
3.2 Encryption at Rest
Data stored on our servers is encrypted:
| Data Type | Encryption | Key Management |
|---|
| Database | AES-256 | AWS KMS |
| File storage | AES-256 | AWS KMS |
| Backups | AES-256 | AWS KMS |
| Logs | AES-256 | AWS KMS |
3.3 Desktop Application
Local data on your device:
| Data Type | Protection |
|---|
| Projects/Data | AES-256 encryption |
| Credentials | OS secure storage (Keychain/Credential Manager) |
| Session tokens | Encrypted, short-lived |
| Local cache | Encrypted |
4. Application Security
4.1 Secure Development
We follow secure development practices:
- Code review required for all changes
- Static analysis (SAST) in CI/CD pipeline
- Dependency scanning for vulnerabilities
- Secret scanning to prevent credential leaks
- Security-focused code guidelines
4.2 Authentication Security
We use Clerk for authentication, providing:
- Multi-factor authentication (MFA) support
- Passwordless options (magic links, passkeys)
- Brute force protection (rate limiting, lockouts)
- Session management (secure tokens, expiration)
- OAuth/SSO integration (Google, GitHub, Microsoft)
4.3 Authorization
- Role-based access control (RBAC) for team features
- Principle of least privilege for internal access
- API key scoping with granular permissions
- Audit logging for sensitive actions
4.4 Input Validation
We protect against common attacks:
- SQL injection — Parameterized queries, ORM usage
- XSS — Input sanitization, Content Security Policy
- CSRF — Token-based protection
- Path traversal — Input validation, sandboxing
5. Desktop Application Security
5.1 Code Signing
The desktop application is signed to verify authenticity:
| Platform | Signing |
|---|
| Windows | Microsoft Authenticode (EV certificate) |
| macOS | Apple Developer ID + Notarization |
| Linux | GPG signatures |
Always download from official sources to ensure you have genuine software.
5.2 Update Security
- Updates are signed and verified before installation
- Update server connections use certificate pinning
- Rollback capability if updates cause issues
- Security updates can be auto-installed
5.3 Sandboxing
The desktop application:
- Runs with minimal system privileges
- Isolates the Python sidecar process
- Restricts file system access to necessary directories
- Uses secure IPC for inter-process communication
5.4 Local Data Protection
- Sensitive data encrypted with AES-256
- Credentials stored in OS secure storage
- Memory cleared after sensitive operations
- Secure deletion of temporary files
6. Access Controls
6.1 Employee Access
We limit internal access to your data:
| Principle | Implementation |
|---|
| Least privilege | Employees only access what's needed for their role |
| Need-to-know | Data access requires business justification |
| Access reviews | Quarterly review of access permissions |
| Separation of duties | Critical operations require multiple approvals |
6.2 When We Access Your Data
We only access your data when:
- You explicitly request support
- Investigating reported security issues
- Required by law (with legal process)
- Preventing imminent harm
We never access your data for:
- Marketing purposes
- Selling to third parties
- Training public AI models (without consent)
- Satisfying curiosity
6.3 Audit Logging
We maintain logs of:
- Administrative access to systems
- Data access by employees (when it occurs)
- Security-relevant events
- Authentication events
Logs are retained for security analysis and compliance.
7. Third-Party Security
7.1 Vendor Assessment
Before using third-party services, we evaluate:
- Security certifications (SOC 2, ISO 27001)
- Privacy practices and compliance
- Data handling procedures
- Incident response capabilities
- Contractual security requirements
7.2 Key Third Parties
| Service | Purpose | Security Standards |
|---|
| Clerk | Authentication | SOC 2, GDPR |
| Stripe | Payments | PCI DSS Level 1 |
| Vercel | Hosting | SOC 2, ISO 27001 |
| AWS | Infrastructure | SOC 2, ISO 27001, FedRAMP |
| PostHog | Analytics | SOC 2, GDPR |
| OpenAI | AI features | SOC 2, enterprise agreements |
| Anthropic | AI features | SOC 2, enterprise agreements |
7.3 Data Processing Agreements
We have Data Processing Agreements (DPAs) with all processors handling personal data, ensuring GDPR and other regulatory compliance.
8. Incident Response
8.1 Our Process
We have a documented incident response plan:
- Detection — Monitoring, alerts, user reports
- Triage — Assess severity and scope
- Containment — Limit impact immediately
- Investigation — Determine root cause
- Remediation — Fix the vulnerability
- Recovery — Restore normal operations
- Post-mortem — Learn and improve
8.2 Notification
In case of a security incident affecting your data:
| Severity | Notification Timeline |
|---|
| Critical (data breach) | Within 72 hours |
| High (potential exposure) | Within 7 days |
| Medium (no data exposure) | In next security update |
| Low (minimal impact) | Documented in changelog |
We notify:
- Affected users via email
- Regulatory authorities as required
- Public disclosure for significant incidents
8.3 What We'll Tell You
In case of an incident, we disclose:
- What happened (to the extent known)
- What data was affected
- What we're doing about it
- What you should do (if anything)
- How to contact us with questions
9. Vulnerability Management
9.1 Security Testing
We conduct regular security assessments:
| Type | Frequency |
|---|
| Automated scanning | Continuous |
| Dependency audits | Weekly |
| Internal security review | Monthly |
| External penetration testing | Annually |
9.2 Responsible Disclosure
We welcome security researchers to report vulnerabilities:
Email: security@ubik.studio
What to include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Your contact information
Our commitment:
- Acknowledge receipt within 48 hours
- Provide status updates
- Work to fix valid issues promptly
- Credit researchers (if desired)
- No legal action against good-faith researchers
Please do not:
- Access other users' data
- Disrupt service availability
- Publicly disclose before we've fixed the issue
- Use automated scanners that generate excessive traffic
9.3 Bug Bounty
We may offer rewards for significant vulnerabilities. Contact security@ubik.studio for current program details.
10. Compliance
10.1 Regulatory Compliance
We design our systems to support compliance with:
| Regulation | Status |
|---|
| GDPR | Compliant |
| CCPA/CPRA | Compliant |
| SOC 2 Type II | In progress |
| HIPAA | Not currently (contact for healthcare needs) |
10.2 Data Residency
By default, data is stored in the United States. Enterprise customers may request specific data residency arrangements.
10.3 Data Processing Agreements
Enterprise customers can request:
- Custom Data Processing Agreements (DPAs)
- Standard Contractual Clauses (SCCs) for international transfers
- Business Associate Agreements (BAAs) for healthcare (limited availability)
Contact info@ubik.studio for compliance documentation.
11. Your Security Responsibilities
Security is a shared responsibility. Here's how you can help:
11.1 Account Security
- Use strong, unique passwords (12+ characters, mixed types)
- Enable MFA — Settings → Security → Two-Factor Authentication
- Don't share credentials — Each user needs their own account
- Review connected devices — Settings → Security → Sessions
- Log out on shared devices
11.2 Desktop Application
- Download from official sources only — ubik.studio or official app stores
- Keep the app updated — Security patches are important
- Use device encryption — BitLocker (Windows), FileVault (macOS), LUKS (Linux)
- Lock your device when away
- Use antivirus software and keep it updated
11.3 Data Handling
- Back up important data — Don't rely solely on cloud storage
- Be careful with exports — Downloaded data isn't encrypted
- Review sharing settings — Know who can access your projects
- Report suspicious activity — Contact us immediately
11.4 Phishing Awareness
We will never:
- Ask for your password via email
- Send unexpected attachments
- Request payment via unusual methods
- Pressure you to act immediately
If you receive suspicious communications claiming to be from Ubik, forward them to security@ubik.studio.
12. Security Features
12.1 Available to All Users
- Two-factor authentication (MFA)
- Session management
- Login notifications
- Password requirements
- Secure password reset
12.2 Professional Features
- API key management
- Access logs
- Advanced session controls
12.3 Enterprise Features
- SAML/SSO integration
- Custom security policies
- Audit log exports
- IP allowlisting
- Advanced access controls
- Dedicated security reviews
13. Frequently Asked Questions
Is my data encrypted?
Yes. All data is encrypted in transit (TLS 1.3) and at rest (AES-256).
Who can access my data?
Only you and those you share with. Ubik employees cannot access your data without your permission or legal requirement.
Do you sell my data?
No. We never sell personal data or user content.
What happens if there's a breach?
We'll notify affected users within 72 hours, explain what happened, and provide guidance on protective steps.
Is the desktop app safe?
Yes. It's code-signed, regularly updated, and uses encryption for local data. Always download from official sources.
Do you have SOC 2?
SOC 2 Type II certification is in progress. Contact info@ubik.studio for current compliance documentation.
Can I request a security assessment?
Enterprise customers can request security questionnaires and assessments. Contact your account manager.
14. Contact Security Team
For security concerns or to report vulnerabilities:
Security Team: security@ubik.studio
General Support: info@ubik.studio
Website: www.ubik.studio
For urgent security issues, include "URGENT" in the subject line.