CRM by Beezifi
Legal

Security Policy

Beezifi Inc.  ·  Effective Date: April 22, 2026  ·  Last Updated: April 22, 2026

Contents
  1. Our Security Commitment
  2. Data Isolation
  3. Authentication & Access Control
  4. Data Encryption
  5. Network & Infrastructure Security
  6. Application Security
  7. Audit Logging
  8. Incident Response
  9. Your Responsibilities
  10. Vulnerability Disclosure
Security is not a feature — it is the foundation of every design decision we make at Beezifi. This document describes the technical and organizational measures we employ to protect your data and the systems that store it.

1. Our Security Commitment

Beezifi Inc. is committed to maintaining the confidentiality, integrity, and availability of all data entrusted to our platform. We apply security controls at every layer of the stack — from the database schema to the HTTP response headers — and treat security as an ongoing operational discipline rather than a one-time configuration.

We believe in transparency. This document explains precisely what we do to protect your data and what we expect from you as an administrator or user of the platform.

2. Data Isolation

Every workspace runs in a fully dedicated database. There are no shared tables, no shared schemas, and no shared data layers between tenants. A bug or misconfiguration in one workspace cannot expose data from another.

Technical implementation:

3. Authentication & Access Control

Password Security

All passwords are hashed using bcrypt with a work factor of 10 before storage. We never store, log, or transmit plaintext passwords at any point. Password reset flows issue short-lived, single-use tokens only.

Session Tokens

The platform uses JSON Web Tokens (JWT) for session management. Tokens are:

Two-Factor Authentication (TOTP)

Every user account — including system administrators — can enable TOTP-based two-factor authentication compatible with Google Authenticator, Authy, 1Password, and any RFC 6238-compliant app. When enabled:

We strongly recommend enabling TOTP for all admin accounts.

Role-Based Access Control

Every API endpoint enforces role-based access controls. The platform supports five roles with increasingly restrictive permissions:

Role assignments are enforced at the API middleware layer. Attempting to call an endpoint above your role returns a 403 Forbidden response with no data exposure.

Rate Limiting

Authentication endpoints (login, TOTP verification) are rate-limited per IP address to prevent brute-force attacks. Excessive failed attempts result in temporary lockout at the network layer.

4. Data Encryption

🔒 In Transit

All communication between clients and the platform is encrypted using TLS 1.2 or higher. HTTP connections are redirected to HTTPS. Strict-Transport-Security (HSTS) headers are set to enforce this in supporting browsers.

🗄️ At Rest

Sensitive fields (TOTP secrets) are encrypted at the application layer before storage. All databases reside on encrypted storage volumes at the infrastructure level.

🔑 Credentials

All passwords are bcrypt-hashed. API secrets, JWT signing keys, and database credentials are stored in environment variables, never in source code or version control.

📦 Backups

Database backups are encrypted at rest. Backup access is restricted to authorized infrastructure personnel through audited processes.

5. Network & Infrastructure Security

6. Application Security

HTTP Security Headers

The API server uses Helmet.js to apply a suite of HTTP security headers on every response, including:

Input Validation & SQL Injection Prevention

All database queries use parameterized statements via the mysql2 driver. User-supplied input is never interpolated directly into SQL strings. Tenant slugs and identifiers are validated against strict regular expressions before use in any database or filesystem operation.

CORS Policy

Cross-Origin Resource Sharing (CORS) is configured to allow only trusted origins. Requests from untrusted origins are rejected at the network layer.

Dependency Supply Chain

We use a minimal, well-maintained set of production dependencies. All packages are pinned to specific versions. We run automated vulnerability scans on the dependency tree as part of our deployment process.

7. Audit Logging

Every significant action within a workspace is written to an append-only audit log, including:

Audit records are timestamped in UTC and attributed to the authenticated user who performed the action. Audit logs are readable by workspace admins and are not modifiable by any application user. System-level audit logs (infrastructure access, admin panel actions) are maintained separately and retained for a minimum of one year.

8. Incident Response

Detection

We monitor infrastructure and application logs for anomalous patterns, including unusual authentication activity, unexpected data access volumes, and dependency vulnerability alerts.

Response

In the event of a confirmed security incident:

  1. The affected system or workspace is isolated to prevent further exposure
  2. The scope and nature of the incident is assessed by our security team
  3. Affected workspaces are notified within 72 hours of discovery, as required by applicable data protection law
  4. A post-incident report describing the nature of the breach, data affected, and remediation steps taken is provided to affected administrators

Notification

Breach notifications are sent to the admin email address on file for each affected workspace. If you suspect your workspace has been compromised, contact us immediately at security@beezifi.com. Include your workspace name, the nature of the suspected issue, and any supporting details.

9. Your Responsibilities

Security is a shared responsibility. As a workspace administrator or user, you are responsible for:

10. Vulnerability Disclosure

We welcome responsible disclosure of security vulnerabilities. If you discover a potential security issue in our platform, please report it to us before public disclosure so we can investigate and remediate it.

Responsible Disclosure Guidelines

Report to: security@beezifi.com

Please include in your report:

  • A clear description of the vulnerability and its potential impact
  • Steps to reproduce or proof-of-concept (sanitized to avoid unnecessary data exposure)
  • The affected endpoint, component, or feature
  • Your contact information for follow-up

Our commitment to you:

  • We will acknowledge receipt of your report within 2 business days
  • We will investigate and provide a status update within 7 business days
  • We will not pursue legal action against researchers who act in good faith and follow these guidelines
  • We will credit researchers publicly (with their consent) upon remediation

Please do not access, modify, or delete data belonging to other workspaces during testing. Conduct all testing against workspaces you own.

Beezifi Inc. — Security Team

Email: security@beezifi.com

For general privacy questions: privacy@beezifi.com

For legal inquiries: legal@beezifi.com

For urgent security incidents, please mark your email subject line with [URGENT SECURITY].