πŸ”’ Security & Trust

Your Data, Protected by Design

At Dictionary, security isn't an afterthoughtβ€”it's foundational. We employ industry-leading encryption, rigorous access controls, and transparent practices to keep your language data safe and private.

\n

How We Protect Your Information

We follow a security-first mindset across every layer of our infrastructure, development pipeline, and organizational culture.

πŸ”

End-to-End Encryption

All data in transit is encrypted using TLS 1.3. Data at rest is protected with AES-256 encryption across all databases and storage systems.

πŸ›‘οΈ

Zero Trust Architecture

We never implicitly trust any user, device, or network. Every access request is verified, authenticated, and authorized before granting permissions.

πŸ‘οΈ

Transparent Logging

Comprehensive audit trails track all administrative actions, data access, and system changes. Logs are immutable and retained for compliance.

πŸ”„

Continuous Monitoring

24/7 threat detection powered by AI analyzes network traffic, user behavior, and system logs to identify and neutralize anomalies instantly.

πŸ§ͺ

Regular Penetration Testing

Independent third-party security firms conduct quarterly penetration tests and code audits to identify and remediate vulnerabilities proactively.

πŸ“‹

Least Privilege Access

Team members only receive the minimum access required for their role. Multi-factor authentication is mandatory for all internal systems.

Globally Recognized Standards

We maintain rigorous compliance with international data protection regulations and industry security frameworks.

πŸ›οΈ

SOC 2 Type II

Annually audited for security, availability, and confidentiality.

πŸ‡ͺπŸ‡Ί

GDPR Compliant

Full adherence to EU General Data Protection Regulation standards.

🌊

CCPA Ready

California Consumer Privacy Act compliant data handling practices.

πŸ”’

ISO 27001

Information Security Management System certified.

πŸ“„ Our full compliance reports and audit summaries are available to enterprise customers upon request. We publish an annual transparency report detailing government data requests and takedown notices.

Your Data, Your Control

We believe transparency is the cornerstone of trust. You own your data, and we provide clear mechanisms to access, export, or permanently delete it at any time.

  • βœ“ Automatic data deletion upon account closure
  • βœ“ One-click export of your complete dictionary & search history
  • βœ“ No sale of personal data to third-party advertisers
  • βœ“ Anonymous aggregation for product improvement only
πŸ”‘
Encryption at Rest

AES-256 standard across all cloud storage

☁️
Geographic Isolation

Data resides in your chosen region only

πŸ‘€
User Consent Management

Granular privacy toggles & audit logs

Report Security Vulnerabilities

We value the security community. If you discover a potential vulnerability, please report it responsibly.

How to Report

We appreciate responsible disclosure and will work with you to understand, validate, and resolve any identified issues. We do not pursue legal action against researchers who follow our disclosure guidelines.

  • 1 Email our security team with a detailed description of the vulnerability.
  • 2 Provide reproducible steps and potential impact assessment.
  • 3 Allow 90 days for investigation and remediation before public disclosure.
  • 4 Do not exploit the vulnerability, access other user data, or disrupt services.

πŸ“§ Contact Security Team

For urgent matters, please use PGP encryption (key available on our transparency page).

Security Questions

Common questions about our security practices, data handling, and compliance.

No. We never sell, rent, or share personally identifiable information with third parties for marketing purposes. We only share data with essential service providers (like cloud infrastructure) under strict data processing agreements that prohibit further sharing.

Search history is stored only as long as your account is active. You can manually delete it at any time from your dashboard. Upon account deletion, all associated data is permanently purged from our systems within 30 days.

We do not store credit card details. All payments are processed by PCI DSS Level 1 compliant providers (Stripe & Braintree). We only receive a tokenized confirmation for billing purposes.

We maintain an incident response plan compliant with global regulations. In the unlikely event of a breach affecting personal data, we will notify affected users within 72 hours, report to relevant authorities, and provide clear guidance on protective steps.