Information Security Policy

Effective March 5, 2026 · Approved by Sean Appleby, CEO

1. Purpose & Objectives

This Information Security Policy (ISP) establishes seanCo's commitment to protecting the confidentiality, integrity, and availability of all information assets within the attune platform. Attune processes deeply personal data—journal entries, goals, health observations, financial summaries, and location context—and we treat the security of that data as a core product obligation, not an afterthought.

Our objectives are to:

  1. Protect user data against unauthorized access, disclosure, alteration, or destruction.
  2. Maintain the availability and resilience of attune's services.
  3. Comply with applicable privacy and security regulations.
  4. Foster a culture of security awareness across the organization.
  5. Continuously improve our security posture through regular assessment and iteration.

2. Scope

This policy applies to:

3. Accountability

3.1 Executive Ownership

The CEO is the accountable owner of this policy and is responsible for ensuring adequate resources are allocated to information security. The CEO reviews and approves this policy at least annually.

3.2 Engineering

All engineers are responsible for:

3.3 Third-Party Providers

Third-party services (Google Cloud Platform, Plaid, Anthropic, PowerSync) are selected based on their security posture and are bound by data processing agreements that meet or exceed the controls in this policy.

4. Information Classification

5. Key Security Controls

5.1 Encryption

5.2 Access Control

Covered in detail in the Access Control Policy. In summary: least privilege by default, role-based access, MFA required for all infrastructure access.

5.3 Secure Development

5.4 Infrastructure Security

5.5 Logging & Monitoring

6. Risk Management

6.1 Risk Assessment

We conduct risk assessments when:

6.2 Identified Risks & Mitigations

7. Incident Response

  1. Detection: Incidents may be detected via monitoring alerts, user reports, or third-party notifications.
  2. Containment: Immediately isolate affected systems. Revoke compromised credentials. Scale down affected deployments if necessary.
  3. Investigation: Determine scope, root cause, and affected data. Preserve logs for analysis.
  4. Notification: Affected users are notified within 72 hours of confirmed data breaches, in compliance with applicable regulations.
  5. Remediation: Fix root cause, deploy patches, and update controls to prevent recurrence.
  6. Post-mortem: Document the incident, response, and lessons learned. Update this policy if needed.

8. Business Continuity

9. Policy Review

This policy is reviewed and approved by the CEO at least annually, or whenever a material change to the security environment occurs (new integrations, infrastructure changes, or incidents). All updates are versioned and communicated to relevant personnel.

10. Contact

Security concerns or questions about this policy can be directed to you@snappleby.xyz.