bluedoor

Legal

Cybersecurity Policy

This policy describes the cybersecurity governance, operational safeguards, and incident-response principles bluedoor uses to protect its services and support resilient operations.

Last updated: March 18, 2026

1. Purpose

This Cybersecurity Policy summarizes the principles and controls bluedoor uses to manage cybersecurity risk across its systems, infrastructure, software, and operational processes.

Our objective is to maintain a security program that is appropriate to the nature of our services, the sensitivity of information we handle, and the evolving threat environment.

2. Security Governance

bluedoor maintains internal processes for identifying, evaluating, prioritizing, and addressing cybersecurity risks. Security responsibilities are assigned across technical and operational functions, and security considerations are incorporated into ongoing product, infrastructure, and vendor decisions.

We periodically review policies, controls, and procedures to assess whether they remain appropriate for our current systems, business activities, and risk profile.

3. Access Control

Access to systems and information is limited to authorized personnel, service accounts, and vendors with a legitimate business need. Access is managed using role-based principles where appropriate and is subject to review, modification, or revocation as circumstances change.

We seek to reduce unauthorized access risk through credential management practices, least-privilege controls, and authentication measures appropriate to the systems in use.

4. Data and System Protection

We use a combination of technical, administrative, and operational safeguards intended to protect systems and information from unauthorized access, misuse, disruption, or loss. These measures may include encryption, environment separation, logging, monitoring, patching, vulnerability management, backups, and change-management procedures, as appropriate.

Security controls are designed to evolve as our systems, vendors, and risk environment change over time.

5. Detection and Response

We maintain processes intended to detect, investigate, and respond to suspected security events in a timely manner. Where appropriate, this may include alerting, containment, remediation, recovery actions, post-incident review, and communication with affected stakeholders.

If we determine that a security incident requires notification under applicable law or contractual obligation, we will provide such notice in accordance with those requirements.

6. Third-Party Risk

bluedoor relies on third-party infrastructure, software, payment, analytics, and data providers. We consider cybersecurity and data protection factors when selecting and managing material service providers, although we cannot control every aspect of a third party's environment.

Third-party dependencies remain subject to their own operational and security practices, and use of such providers does not eliminate residual risk.

7. User Responsibilities

Users play an important role in protecting their own accounts and devices. You are responsible for maintaining secure credentials, controlling access to your local environment, installing updates, and promptly reporting suspected unauthorized activity involving your account.

8. Policy Maintenance and Contact

This Cybersecurity Policy may be updated from time to time to reflect changes in our systems, operations, vendors, legal obligations, or security practices. The current version will be indicated by the "Last updated" date above.

Security-related questions or vulnerability reports may be directed to security@bluedoor.sh.