Tranquiex Logo

Built for Safety. Powered by Trust.

A look into our security and data handling standards.

Data Encryption

At Rest

  • • AES-256 encryption for stored data
  • • Secure key management system
  • • Regular encryption key rotation

In Transit

  • • TLS 1.3 for all communications
  • • End-to-end encryption for sensitive data
  • • Certificate pinning for API requests

Access Control

Role-Based Access

Our internal teams follow strict role-based access control:

  • • Granular permission system for team access
  • • Regular access reviews and audits
  • • No external third-party sharing without explicit consent

Auth & Account Protection

Authentication

  • • Google/Microsoft Authenticator support
  • • Biometric authentication options
  • • Multi-factor authentication (MFA)

Session Management

  • • Secure token-based sessions
  • • Automatic session expiry
  • • Device-based authentication

Hardware Safety

Device Security

Our hardware components are designed with safety in mind:

  • • Wearable device tested for comfort and safety standards
  • • Battery protection circuits for overcharge prevention
  • • Certified charger compatibility requirements
  • • Regular firmware security updates

User Protections

Privacy Controls

  • • Opt-in camera usage with permissions
  • • Local-only AI model processing
  • • Data minimization practices

Data Control

  • • User data export capabilities
  • • Account deletion options
  • • Transparent data usage policies

Incident Handling

Response Protocol

Our incident response plan includes:

  • • Immediate user notification for security events
  • • Automated threat detection and response
  • • Regular backup and recovery testing
  • • Detailed incident documentation and analysis