TAPUI
General

tapui security privacy

<!-- -->

TTTapUI Team

TapUI Security Overview

Security architecture follows defense-in-depth principles. Multiple protective layers ensure data safety even if individual controls fail. | Security Layer | Implementation | Purpose | |----------------|----------------|---------| | Data Encryption | AES-256 at rest, TLS 1.3 in transit | Protect data from unauthorized access | | Access Controls | Role-based permissions, SSO integration | Limit data exposure to authorized users | | Infrastructure | SOC 2 Type II certified cloud providers | Secure underlying systems | | Compliance | GDPR, SOC 2, HIPAA (Enterprise) | Meet regulatory requirements | | Monitoring | Continuous logging, anomaly detection | Identify and respond to threats | These layers work together to provide comprehensive protection for all user data and designs.

Data Encryption

Encryption protects your data from unauthorized access throughout its lifecycle. TapUI encrypts data at rest, in transit, and during processing. ### Encryption at Rest All stored data uses AES-256 encryption. This includes design files, user profiles, billing information, and system logs. Encryption keys rotate regularly according to security best practices. Database encryption happens automatically without user action. You cannot disable encryption or store data unencrypted. This ensures consistent protection across all accounts. Backup systems maintain the same encryption standards. Disaster recovery copies of your data remain protected even in backup storage. ### Encryption in Transit Data traveling between your device and TapUI servers uses TLS 1.3 encryption. This is the latest transport layer security standard with enhanced performance and security. Certificate pinning prevents man-in-the-middle attacks. TapUI applications verify server certificates against known good values before transmitting data. API endpoints require HTTPS connections. Unencrypted HTTP requests are automatically redirected to HTTPS or rejected entirely. ### Encryption During Processing AI processing occurs in isolated environments with encrypted memory. Generated designs remain protected during the creation process. Temporary processing data deletes immediately after generation completes. No design content persists in processing systems beyond the active session. Secure enclaves handle sensitive operations. Password verification and authentication tokens process in hardware-isolated environments.

Data Storage and Retention

Understanding where and how long TapUI stores your data helps you manage information lifecycle and compliance requirements. ### Data Residency Primary data storage occurs in AWS regions based on your account location. US accounts store data in US regions. EU accounts store data in European regions to support GDPR requirements. Enterprise plans offer data residency selection. Choose specific regions for data storage to meet regulatory or organizational requirements. CDN caches distribute content globally for performance. Static assets cache at edge locations but do not contain sensitive design content. ### Retention Policies Active project data persists indefinitely while your account remains active. Cancel accounts retain data for 90 days before permanent deletion to enable reactivation. Version history follows plan limits. Free plans retain 10 versions. Pro and Team plans retain unlimited history. Enterprise plans configure custom retention periods. Deleted projects move to trash for 30 days before permanent deletion. Recover accidentally deleted work during this window. Audit logs retain for one year minimum. Enterprise plans extend retention to meet specific compliance requirements. ### Data Deletion Permanent deletion removes all copies of data from primary storage and backups. Deleted data cannot be recovered after the deletion process completes. Account deletion initiates data removal across all systems. The process completes within 30 days of deletion request. GDPR right-to-erasure requests process within 30 days. Confirmation emails verify deletion completion.

Access Controls

Access controls ensure only authorized users reach your data. TapUI implements multiple authentication and authorization mechanisms. ### Authentication Password requirements enforce strong credentials. Minimum length of 12 characters with complexity requirements prevent weak passwords. Multi-factor authentication adds additional verification. Require SMS codes, authenticator apps, or hardware keys for account access. Session management limits concurrent logins. Review active sessions and revoke access from unknown devices. Password resets require email verification. Reset links expire after 24 hours and can only be used once. ### Authorization Role-based access controls manage team permissions. Assign viewer, editor, or admin roles to control what team members can access and modify. Project-level permissions restrict access to specific designs. Sensitive projects remain visible only to authorized team members. External sharing uses time-limited, password-protected links. Share designs with clients and stakeholders without granting account access. API keys enable programmatic access with scoped permissions. Generate keys with limited access rights for specific integrations. ### Single Sign-On (Enterprise) Enterprise plans integrate with identity providers. Connect to SAML 2.0, OIDC, or Active Directory for centralized authentication. SSO enforcement requires all users to authenticate through your identity provider. Disable direct TapUI login for your organization. Just-in-time provisioning creates TapUI accounts automatically when users authenticate through SSO. Remove access from your identity provider to revoke TapUI access immediately.

Infrastructure Security

Underlying infrastructure security protects against attacks targeting servers, networks, and physical facilities. ### Cloud Provider Security TapUI operates on AWS and Google Cloud Platform. Both providers maintain comprehensive security certifications including SOC 2 Type II, ISO 27001, and PCI DSS. Provider security includes physical data center protection, network isolation, and hardware security modules. TapUI inherits these protections through cloud deployment. Multi-region redundancy ensures availability. Data replicates across availability zones to prevent loss from regional failures. ### Network Security Firewalls restrict network traffic to authorized ports and protocols. Intrusion detection systems monitor for malicious activity. DDoS protection mitigates denial-of-service attacks. Traffic scrubbing maintains service availability during attack attempts. VPC isolation separates TapUI infrastructure from other cloud tenants. Network traffic between components remains private. ### Vulnerability Management Regular security scans identify vulnerabilities in dependencies and code. Automated scanning runs continuously. Manual penetration testing occurs quarterly. Responsible disclosure program rewards security researchers who report vulnerabilities. Reports receive prompt response and resolution. Security patches deploy within 24 hours of critical vulnerability disclosure. Non-critical updates follow regular deployment schedules.

AI and Data Privacy

Questions about AI training and data usage deserve clear answers. This section explains how TapUI handles your designs and prompts. ### AI Training Data TapUI does not use your designs or prompts to train AI models. Your data remains private and is never incorporated into models used by other users. AI models train on public datasets and licensed content. No customer data contributes to training. Model improvements come from curated datasets and synthetic data generation. Your private designs stay separate from model development. ### Prompt Privacy Text prompts you enter for generation are processed to create designs but not stored permanently. Prompts remain associated with generated designs in your project history. Prompts are not used for AI training. Your proprietary app ideas and descriptions remain confidential. Team administrators cannot view other members' prompts unless explicitly shared. Private prompts stay private. ### Generated Content Ownership You own all designs generated through TapUI. Generated content is yours to use commercially, modify, and distribute without restriction. TapUI claims no ownership over generated designs. License agreements confirm full user ownership. Export code carries the same ownership rights. Generated Swift, React Native, or Flutter code belongs entirely to you.

Compliance Certifications

Compliance certifications demonstrate adherence to recognized security and privacy standards. ### SOC 2 Type II TapUI maintains SOC 2 Type II certification covering security, availability, and confidentiality. Annual audits by independent third parties verify control effectiveness. SOC 2 reports available to Enterprise customers under NDA. Reports detail specific controls and audit findings. Controls cover access management, change management, backup procedures, and incident response. Audit scope includes all systems handling customer data. ### GDPR Compliance European data protection requirements guide TapUI privacy practices. Lawful basis for processing, data minimization, and user rights are fully supported. Data processing agreements available for Enterprise customers. Contracts specify TapUI's obligations as a data processor. Cross-border data transfers use Standard Contractual Clauses. EU data remains protected when processed outside the European Economic Area. User rights implementation includes data export, rectification, and erasure. Privacy settings provide self-service access to most rights. ### HIPAA (Enterprise) Enterprise plans offer HIPAA compliance for healthcare applications. Business Associate Agreements available for covered entities. HIPAA controls include audit logging, access controls, encryption, and breach notification procedures. Healthcare organizations can use TapUI for protected health information. Compliance scope covers design systems for healthcare apps. Generated designs might include patient interfaces, clinical workflows, or medical device controls. ### Other Standards TapUI evaluates additional certifications based on customer needs. PCI DSS, ISO 27001, and FedRAMP assessments progress according to demand. Industry-specific compliance for finance, education, and government sectors under consideration. Roadmap includes expanded certification coverage.

Security Best Practices for Users

While TapUI provides robust security, users should follow best practices to maintain account and data protection. ### Account Security Enable multi-factor authentication on all accounts. This single action prevents most account takeover attempts. Use strong, unique passwords. Password managers generate and store complex passwords securely. Review account activity regularly. Check login history for unfamiliar locations or devices. Keep email secure. Account recovery depends on email access. Compromised email leads to compromised TapUI accounts. ### Team Security Implement principle of least privilege. Grant minimum necessary permissions to each team member. Remove access promptly when team members leave. Regular access reviews prevent lingering permissions. Use shared projects rather than account sharing. Individual accounts provide better audit trails and access control. Train team members on security awareness. Phishing attacks target design teams through fake client requests. ### Design Content Security Avoid including sensitive data in designs. Use placeholder content rather than real user information, passwords, or API keys. Review designs before external sharing. Ensure no confidential information appears in shared links. Watermark designs shared with external parties. Indicate confidentiality status on shared previews.

Incident Response

Despite preventive measures, security incidents may occur. TapUI maintains comprehensive incident response capabilities. ### Detection and Response Automated monitoring detects anomalous activity. Machine learning identifies unusual access patterns, data transfers, or system behavior. 24/7 security operations center monitors for threats. Human analysts investigate alerts and coordinate response. Incident response plan activates within minutes of confirmed security events. Containment, eradication, and recovery procedures execute systematically. ### Breach Notification Security breaches affecting user data trigger notification procedures. Affected users receive email notification within 72 hours of discovery. Regulatory notifications comply with applicable laws. GDPR requires 72-hour notification to supervisory authorities. Other jurisdictions have varying requirements. Public disclosure occurs when breaches affect user privacy significantly. Transparency maintains trust even during adverse events. ### Business Continuity Disaster recovery plans ensure service continuity. Data backups enable restoration from various failure scenarios. Recovery time objectives specify maximum acceptable downtime. Critical systems restore within 4 hours. Full service restoration completes within 24 hours. Regular disaster recovery testing validates procedures. Annual drills confirm backup integrity and recovery process effectiveness.

Third-Party Security

TapUI integrates with third-party services. Each integration undergoes security evaluation. ### Vendor Assessment Third-party providers complete security questionnaires before integration. Assessments review certifications, security practices, and data handling. Vendor risk ratings determine integration approval. High-risk vendors require additional controls or contract terms. Annual re-assessment ensures continued security alignment. Vendors must maintain standards established at initial integration. ### Subprocessors List of subprocessors maintained in privacy documentation. Users receive notification before new subprocessors process data. Data processing agreements govern subprocessor relationships. Contractual obligations flow down to all data processors. Subprocessor locations disclosed for data residency planning. Understand where your data travels during processing. ### API Security Third-party API integrations use OAuth 2.0 authentication. Tokens expire automatically and can be revoked remotely. API scopes limit data access. Grant minimum necessary permissions to each integration. API activity logs track all third-party access. Monitor integrations for unusual patterns.

Conclusion

TapUI security architecture provides enterprise-grade protection for all user data and designs. Encryption, access controls, compliance certifications, and infrastructure security work together to maintain confidentiality, integrity, and availability. From AES-256 encryption to SOC 2 Type II certification, TapUI implements security measures matching the requirements of regulated industries. Healthcare, finance, and enterprise organizations can deploy with confidence. Understanding these security practices enables informed evaluation for sensitive projects. The combination of technical controls and compliance certifications positions TapUI as a secure choice for professional design work. Security remains an ongoing commitment. Continuous monitoring, regular audits, and responsive incident handling maintain protection as threats evolve. **Ready to join the signup for with confidence in a secure environment? [Try TapUI now](/).**

Key takeaways
  1. 1**AES-256 encryption** protects data at rest with TLS 1.3 for data in transit
  2. 2**SOC 2 Type II certified** with annual third-party audits verifying control effectiveness
  3. 3**HIPAA compliance** available for Enterprise plans with Business Associate Agreements
  4. 4**Zero AI training** on your designs - your data is never used to train models
  5. 5**GDPR compliant** with EU data residency options and right-to-erasure support