Last Updated: July 21, 2025
Your security is our priority. Shape is built with privacy and security at its core.
2.1 Encryption Everywhere. (a) In Transit: All data transmission uses TLS 1.3 encryption, (b) At Rest: Your data is encrypted using industry-standard AES-256 encryption, (c) Processing: Sensitive operations use encrypted memory and secure enclaves.
2.2 Data Processing Transparency. (a) Service Delivery: Data may be processed to provide AI features and platform functionality, (b) Safety Monitoring: Content may be analyzed for policy violations and harmful content, (c) Quality Assurance: Inputs and outputs may be reviewed for system improvement, (d) Legal Compliance: Data may be accessed for regulatory compliance and law enforcement.
5.1 Local-First Architecture. (a) Device Processing: Many operations happen directly on your device, (b) Minimal Data Transfer: Only necessary data is transmitted to our servers, (c) Kill Switch: Instantly revoke access to shared changes at any time.
5.2 Infrastructure Security. (a) Cloud Security: Built on enterprise-grade cloud infrastructure, (b) Regular Updates: Automatic security patches and updates, (c) Monitoring: 24/7 security monitoring and threat detection, (d) Backup Systems: Redundant systems ensure data availability.
8.1 Secure Development Practices. (a) Security by Design: Security considerations in every feature, (b) Code Reviews: All code changes reviewed for security implications, (c) Dependency Management: Regular security audits of third-party components, (d) Penetration Testing: Regular security assessments by external experts.
8.2 Code Generation Security. (a) Safe Output: Generated code follows security best practices, (b) Validation: All generated code is validated before delivery, (c) No Secrets: Generated code never includes hardcoded credentials, (d) Your Codebase: Integration respects your existing security patterns.
9.1 Uptime Commitments. (a) Target Uptime: 99.5% monthly uptime (excluding scheduled maintenance), (b) Planned Maintenance: Scheduled during off-peak hours with 48-hour notice, (c) Emergency Maintenance: May occur without notice for security or stability issues, (d) Service Credits: Available for sustained outages exceeding our SLA thresholds.
9.2 Data Backup and Recovery. (a) Automated Backups: Daily encrypted backups of all user data, (b) Retention Period: 30 days of backup history, (c) Geographic Distribution: Backups stored in multiple geographic locations, (d) Recovery Time: Target recovery within 4 hours for critical service restoration.
9.3 Business Continuity. (a) Disaster Recovery Plan: Tested quarterly with documented procedures, (b) Redundant Systems: Critical infrastructure deployed across multiple availability zones, (c) Vendor Dependencies: Diversified cloud infrastructure to avoid single points of failure.
10.1 Regulatory Alignment. (a) Monitoring: Active monitoring of Delaware AI Commission recommendations under House Bill 333, (b) Implementation: Commitment to implementing appropriate AI safety measures as guidance develops, (c) Reporting: Ready to provide AI usage reports to regulatory bodies as required, (d) Safety Standards: Proactive implementation of AI safety best practices ahead of formal requirements.
10.2 AI Risk Management. (a) High-Risk Identification: Regular assessment of AI features for potential risks, (b) Safety Protocols: Implementation of safety measures for generative AI capabilities, (c) User Protection: Safeguards to prevent AI misuse and protect user rights, (d) Continuous Monitoring: Ongoing evaluation of AI system performance and safety.
11.1 Current Practices. (a) Security Frameworks: Following NIST Cybersecurity Framework and Delaware data protection guidelines, (b) Data Protection: GDPR and CCPA-ready privacy practices with attention to emerging AI regulations, (c) Industry Standards: Working toward SOC 2 Type I controls appropriate for SaaS providers, (d) Regular Audits: Internal and external security assessments with focus on AI system security, (e) AI Governance: Monitoring compliance with evolving AI regulations including EU AI Act considerations.
11.2 Security Maturity Journey. (a) Current Status: Early-stage startup with foundational security controls in place, (b) Ongoing Improvements: Continuously enhancing security posture as we grow, (c) External Validation: Working toward third-party security certifications, (d) Transparency: Regular updates on our security progress and challenges.
12.1 Prevention. (a) Threat Intelligence: Continuous monitoring for emerging threats, (b) Automated Detection: Real-time security event detection, (c) Proactive Monitoring: 24/7 security operations center, (d) Regular Drills: Incident response practice and preparation.
12.2 Response Process. (a) Immediate Containment: Isolate and contain any security incidents, (b) Assessment: Evaluate scope and impact of incidents, (c) Notification: Prompt communication with affected users, (d) Remediation: Fix vulnerabilities and strengthen defenses, (e) Post-Incident: Learn from incidents to improve security.
12.3 Communication. (a) Transparency: Clear communication about security issues, (b) Timely Updates: Regular status updates during incidents, (c) Post-Mortem: Detailed analysis and lessons learned, (d) Continuous Improvement: Security enhancements based on findings.
13.1 Best Practices. (a) Strong Passwords: Use unique, complex passwords, (b) Enable 2FA: Add an extra layer of account protection, (c) Regular Reviews: Monitor your account activity regularly, (d) Secure Environment: Keep your devices and browsers updated, (e) Report Issues: Contact us immediately if you notice anything suspicious.
13.2 Account Security. (a) Unique Credentials: Don't reuse passwords from other services, (b) Team Access: Regularly review team member permissions, (c) Session Management: Log out when using shared devices, (d) Data Backup: Keep local backups of critical work.
14.1 Security Updates. (a) Regular Reports: Quarterly security updates and improvements, (b) Vulnerability Disclosure: Responsible disclosure of security issues, (c) Open Communication: Direct line to our security team, (d) Community Feedback: We welcome security feedback from users.
Security is an ongoing commitment. We continuously invest in improving our security posture and protecting your data. As an experimental AI platform, we're transparent about our current capabilities and limitations. Questions? Contact our security team anytime at security@autoshape.ai.