Skip to main content

Security Policy

This page outlines Teamline’s security practices, data protection measures, encryption standards, incident management process, and compliance with industry security requirements

Vlad avatar
Written by Vlad
Updated over a week ago

General Practices

Security is a top priority at Teamline, Inc. Our customers trust us with sensitive and confidential information, and we take that responsibility seriously.

We continuously invest in our security infrastructure, processes, and internal controls to protect customer data and ensure the reliability of our Services. If you have questions related to security practices or wish to report a vulnerability, please contact our support team.


Teamline Staff Practices

Teamline enforces strict internal security standards:

  • All employees undergo security awareness training on an ongoing basis

  • Access to systems and data is granted strictly on a need-to-know basis

  • Background checks are conducted prior to employment where permitted by law

  • All employees are required to review and sign security and confidentiality agreements

These measures ensure responsible handling of customer data at every level of the organization.


Confidentiality

All Teamline employees are contractually obligated to maintain the confidentiality of user data.

  • Access to customer data is restricted and logged

  • Employees may access data only when required for support or operational purposes

  • Access to report data generated through daily usage requires explicit customer permission

We treat all matters related to user data with the highest level of care and confidentiality.


PCI Compliance

Teamline uses Stripe for payment processing. Stripe is a PCI DSS Level 1 certified payment provider.

  • Teamline does not store, process, or transmit credit card data

  • All payment information is handled securely by Stripe


Data Encryption (In Transit and At Rest)

We apply industry-standard encryption practices:

  • Data in transit is protected using TLS encryption

  • Data at rest, including reports and stored records, is encrypted using AES-256

These measures help safeguard customer data from unauthorized access.


Data Retention

  • Customer data can be deleted upon request

  • Custom data retention policies can be arranged, including scheduled data deletion intervals

We aim to provide flexibility to meet customer and regulatory requirements.


Incident Management

In the event of a confirmed security incident or unauthorized access to customer data:

  • Affected customers will be notified promptly

  • Appropriate remediation steps will be taken

We also maintain a public service status page that provides transparency into service uptime and incident history.


Reporting Security Vulnerabilities

If you believe you have discovered a security vulnerability, please report it immediately.

  • All reports are reviewed and investigated

  • Valid issues are prioritized and resolved as quickly as possible

Customers may also request:

  • An internal application vulnerability scan report

📧 To report a vulnerability or ask security-related questions, contact:
[email protected]


Available Policies and Security Documents


Effective Date: October 13, 2025
Last Updated: October 13, 2025

Did this answer your question?