Security · Trust overview

Trust & security.

Breach notification ≤ 72h GDPR Article 33 aligned
Incident response < 24h first acknowledgement
Vuln disclosure 1 BD first response
Data export 60d post-termination

1. Hosting & architecture

The rptxsoftware.com marketing site is served as a static site from Cloudflare's global edge network. AskFolder is a modern web application: a TypeScript / Next.js front-end on Cloudflare, a stateless API tier on serverless infrastructure, and a primary PostgreSQL database (with pgvector for semantic embeddings) managed by Neon, Inc.

The authoritative list of every third-party system that processes customer data is published at /subprocessors and updated whenever it changes.

2. Encryption

In transit: All public endpoints are served over TLS 1.2+ with modern cipher suites. HTTP Strict Transport Security (HSTS) is enabled on both rptxsoftware.com and askfolder.com. Traffic to internal services (database, object storage, background workers) is encrypted via provider-enforced TLS.

At rest: Customer data, including indexed document chunks and vector embeddings, is stored in encrypted PostgreSQL (AES-256 provider-managed encryption via Neon). Object storage for raw documents is encrypted at rest by the underlying provider. Application secrets are held in a provider-managed secret store and never written to the repository.

3. Identity & access management

4. Data residency & retention

Primary production data is currently stored in the United States. For customers with strict EU or UK data residency requirements, contact legal@rptxsoftware.com — region-pinned deployments are on the near-term roadmap and we will tell you honestly when they're ready.

Retention policy is summarized as follows, with the exact wording governed by the Terms of Service and Privacy Policy:

5. Subprocessor management

The current list is at /subprocessors. When we add, change, or remove a subprocessor that processes personal data, we update that page and, for material changes, notify active paying customers by email at least 30 days in advance — giving you the opportunity to object before the change takes effect.

6. Incident response & breach notification

We maintain an internal incident-response runbook. In the event of a confirmed security incident that affects customer data:

7. Business continuity & backups

Primary databases are backed up continuously by our managed PostgreSQL provider, with point-in-time recovery available within the last 7 days and daily snapshots retained for 30 days. Backup restoration procedures are tested regularly.

Because RPTX is a small studio, we design for graceful degradation: our services depend on mainstream, audited providers (Cloudflare, Neon, Paddle) rather than bespoke infrastructure, so continuity of customer data does not depend on any single RPTX employee being reachable.

8. Application security

9. Privacy & data-subject rights

The full policy is at /privacy, and a standard Article 28 Data Processing Agreement is published at /dpa. In summary:

10. Vulnerability disclosure

We welcome responsible disclosure of security issues in any RPTX-operated property.

Scope: rptxsoftware.com and subdomains, askfolder.com and subdomains, and RPTX-authored client libraries or command-line tools.

Out of scope: third-party services listed on the subprocessors page (please report those to the upstream provider), social engineering, denial of service, physical attacks, and automated scanner output without a proof of exploitability.

Process:

  1. Email security@rptxsoftware.com with a clear description and a reproducible proof of concept.
  2. We acknowledge within one business day and agree a coordinated disclosure timeline.
  3. We fix, deploy, and — with your consent — credit you in the hall of fame below.
  4. Please allow us a reasonable window (typically 90 days) to remediate before public disclosure.

Our machine-readable policy is at /.well-known/security.txt (RFC 9116). RPTX does not currently operate a paid bug bounty, but we are happy to acknowledge and, at our discretion, send a small token of appreciation for high-impact reports.

11. Security hall of fame

Researchers who have responsibly disclosed security issues to RPTX will be listed here with their permission. The list is currently empty — if you want to be the first, see the section above.

12. Compliance roadmap

RPTX is a newly-launched studio and we believe honesty about current compliance posture is worth more than a badge we haven't earned yet. Here is where we actually stand:

GDPR / UK GDPR In effect Privacy policy, DPA with SCCs, 72h breach notification, DSAR process.
CCPA / CPRA In effect Covered via the Privacy policy; "Do Not Sell" and deletion rights honoured.
SOC 2 Type II Targeted 2027 Controls mapped to SOC 2 CC categories today; formal audit planned once 12 months of evidence is available.
ISO / IEC 27001 Under review Will be evaluated in parallel with SOC 2 based on customer demand.
HIPAA BAA Not offered We do not currently offer a Business Associate Agreement; please do not upload PHI.
Penetration test Q4 2026 First third-party test scheduled once the product has a meaningful attack surface. Summary available under NDA.

13. Document library

For a signed DPA, SOC 2 readiness questionnaire responses, UBO verification, W-9 / W-8BEN-E, or any security questionnaire, email legal@rptxsoftware.com. We respond within one business day.

14. Contacts

← Back to rptxsoftware.com