This page provides an overview of the security practices put in place to run Missive. For any question, please contact us at email@example.com.
Our security.txt can be found here.
Our service is built on Amazon Web Services and Heroku. These providers offer strong security measures and are compliant with most certifications. Feel free to read more about the security practices of each:
Encryption in transit
All connections between Missive apps and our servers are encrypted using the Transport Layer Security standard (TLS). This also applies to connections between our servers and third-party providers such as Gmail, Office 365, Twilio, Facebook, Twitter, Asana, Pipedrive, Trello, and others.
Here are links to SSL quality reports for our main application domains:
Encryption at rest
All data stored in our database and cloud storage is encrypted at rest.
We encourage people to report vulnerabilities found in our websites and apps directly to us. Do not disclose any information regarding vulnerabilities until we fix them. Rewards are offered at our discretion based on how critical each vulnerability is.
To report vulnerabilities, contact us at firstname.lastname@example.org with a detailed description to help us understand and fix the vulnerability as quickly as possible.
Missive is compliant with the General Data Protection Regulation (GDPR). See our dedicated GDPR page for more information.
All payments made through our services are processed by Stripe which is certified as a PCI Level 1 Service Provider. We do not collect or store payment information in our infrastructure.
Last updated on April 23, 2019.