Connecty
For OrganizersPricing

Security Policy

Last updated: 12/7/2025

Security is fundamental to Connecty's event management platform. This policy outlines our comprehensive security measures to protect your data, transactions, and operations across event creation, ticket sales, venue bookings, and payment processing.

Our Security Commitment

Connecty is committed to maintaining the highest standards of security to protect:

  • Personal and financial information of users and attendees
  • Event data and intellectual property of organizers
  • Payment transactions and venue booking details
  • Organization accounts and multi-tenant data isolation
  • Platform integrity and service availability

Data Encryption

Encryption in Transit

All data transmitted between your device and our servers is protected using industry-standard encryption:

  • TLS 1.3: Latest Transport Layer Security protocol for all connections
  • Perfect Forward Secrecy: Unique session keys prevent past session decryption
  • Strong Cipher Suites: Only approved cryptographic algorithms (AES-256, ChaCha20)
  • HSTS: HTTP Strict Transport Security enforces secure connections
  • Certificate Pinning: Additional protection against man-in-the-middle attacks

Encryption at Rest

Data stored on our systems is encrypted using:

  • AES-256 Encryption: Military-grade encryption for all stored data
  • Database Encryption: Full database encryption with regular key rotation
  • File Storage Encryption: Encrypted storage for event images, documents, and media
  • Backup Encryption: All backups encrypted with separate encryption keys
  • Key Management: Secure key storage using hardware security modules (HSMs)

Infrastructure Security

Cloud Infrastructure

Our platform is hosted on enterprise-grade cloud infrastructure:

  • Tier 1 Cloud Provider: Industry-leading cloud infrastructure (AWS/GCP/Azure)
  • Geographic Redundancy: Data replicated across multiple regions
  • DDoS Protection: Advanced protection against distributed denial-of-service attacks
  • Network Isolation: Virtual private clouds (VPCs) with strict network segmentation
  • Firewalls: Multi-layer firewall protection with intrusion detection

Physical Security

Our cloud providers maintain:

  • 24/7 physical security and surveillance
  • Biometric access controls
  • Environmental controls (temperature, humidity, fire suppression)
  • SOC 2 Type II certified data centers
  • ISO 27001 certified facilities

Application Security

  • Web Application Firewall (WAF): Protection against common web attacks
  • API Security: Rate limiting, authentication, and input validation
  • Container Security: Secured containerized deployments with regular scanning
  • Secure Development: Security-first development practices and code review
  • Dependency Scanning: Automated scanning for vulnerable dependencies

Access Control and Authentication

User Authentication

  • Password Requirements: Strong password policies with minimum complexity
  • Password Hashing: Bcrypt/Argon2 with salt for secure password storage
  • Multi-Factor Authentication (MFA): Optional 2FA via authenticator apps or SMS
  • Session Management: Secure session tokens with automatic timeout
  • OAuth 2.0: Secure third-party authentication options
  • Account Lockout: Automatic lockout after failed login attempts

Access Controls

  • Role-Based Access Control (RBAC): Granular permissions for users and organizations
  • Principle of Least Privilege: Users granted minimum necessary permissions
  • Multi-Tenant Isolation: Complete data separation between organizations
  • Audit Logging: Comprehensive logging of access and actions
  • Session Monitoring: Detection of suspicious login patterns

Employee Access

  • Strict background checks for all employees
  • Mandatory security training and ongoing education
  • Just-in-time access provisioning for support staff
  • All access logged and monitored
  • Regular access reviews and revocation
  • Separate production and development environments

Payment Security

Financial transactions are protected with the highest security standards:

PCI-DSS Compliance

Connecty is compliant with Payment Card Industry Data Security Standard (PCI-DSS) requirements for handling payment card information.

  • Tokenization: Card data replaced with secure tokens, never stored on our servers
  • PCI-DSS Certified Processors: Payments processed through certified providers (Stripe, PayPal)
  • 3D Secure: Additional authentication for card transactions
  • Fraud Detection: Real-time fraud monitoring and prevention
  • Secure Checkout: Encrypted payment forms with no card data exposure
  • Chargeback Protection: Monitoring and dispute management systems

Monitoring and Detection

Security Monitoring

  • 24/7 Monitoring: Continuous monitoring of systems and applications
  • Intrusion Detection: Automated detection of suspicious activities
  • Log Analysis: Centralized logging with security event correlation
  • Anomaly Detection: Machine learning-based detection of unusual patterns
  • Real-time Alerts: Immediate notification of security events
  • Security Information and Event Management (SIEM): Comprehensive security monitoring

Vulnerability Management

  • Regular Scanning: Automated vulnerability scanning of infrastructure and applications
  • Penetration Testing: Annual third-party security assessments
  • Bug Bounty Program: Responsible disclosure program for security researchers
  • Patch Management: Timely application of security patches and updates
  • Security Advisories: Monitoring of security bulletins and CVEs

Incident Response

We maintain a comprehensive incident response plan:

Response Process

1. Detection and Analysis

Rapid identification and assessment of security incidents through monitoring systems

2. Containment

Immediate action to isolate affected systems and prevent spread

3. Eradication

Removal of threats and vulnerabilities from affected systems

4. Recovery

Restoration of normal operations with enhanced security measures

5. Post-Incident Review

Analysis and documentation to improve future response and prevention

Breach Notification

In the event of a data breach:

  • Affected users notified within 72 hours (as required by GDPR)
  • Regulatory authorities informed as required by law
  • Clear communication about nature and scope of breach
  • Guidance provided on protective measures
  • Regular updates throughout incident resolution

Compliance and Certifications

Connecty maintains compliance with industry standards and regulations:

GDPR

Full compliance with EU General Data Protection Regulation

PCI-DSS

Payment Card Industry Data Security Standard compliance

SOC 2 Type II

Annual audit of security, availability, and confidentiality controls

ISO 27001

Information Security Management System certification

Business Continuity

Backup and Recovery

  • Automated Backups: Continuous and daily backups of all critical data
  • Geographic Redundancy: Backups stored in multiple geographic locations
  • Backup Encryption: All backups encrypted and access-controlled
  • Recovery Testing: Regular testing of backup restoration procedures
  • Point-in-Time Recovery: Ability to restore to specific points in time
  • Disaster Recovery Plan: Documented procedures for major incidents

High Availability

  • 99.9% uptime SLA for critical services
  • Load balancing across multiple servers
  • Auto-scaling to handle traffic spikes
  • Failover systems for database and application servers
  • Content delivery network (CDN) for global performance

Secure Development Practices

  • Security by Design: Security integrated into development lifecycle
  • Code Reviews: Peer review of all code changes
  • Static Analysis: Automated security scanning of source code
  • Dynamic Testing: Runtime security testing of applications
  • OWASP Top 10: Protection against common web vulnerabilities
  • Secure Coding Standards: Adherence to industry best practices
  • Version Control: Secure code repository with access controls
  • CI/CD Security: Secure build and deployment pipelines

Third-Party Security

We carefully vet all third-party services and vendors:

  • Security Assessments: Due diligence review of vendor security practices
  • Data Processing Agreements: Contractual security requirements for all processors
  • Regular Audits: Ongoing monitoring of third-party compliance
  • Minimal Data Sharing: Only necessary data shared with third parties
  • Vendor Management: Centralized tracking of third-party relationships

User Security Best Practices

We recommend users follow these security practices:

  • Strong Passwords: Use unique, complex passwords for your account
  • Enable MFA: Activate multi-factor authentication for added security
  • Regular Updates: Keep your devices and browsers up to date
  • Secure Networks: Avoid public Wi-Fi for sensitive transactions
  • Phishing Awareness: Be cautious of suspicious emails or links
  • Account Monitoring: Regularly review account activity and audit logs
  • Logout: Always log out when using shared or public devices

Responsible Disclosure

We welcome reports of security vulnerabilities from security researchers and users:

Security Contact: security@connecty.com

PGP Key: Available upon request for encrypted communications

Response Time: We aim to acknowledge reports within 24 hours

When reporting a vulnerability, please include:

  • Description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact assessment
  • Your contact information

We ask that you:

  • Do not access or modify user data
  • Do not perform destructive testing
  • Allow us reasonable time to address the issue before public disclosure
  • Make a good faith effort to avoid privacy violations

Security Training and Awareness

All Connecty employees undergo comprehensive security training:

  • Mandatory security onboarding for all new employees
  • Annual security awareness training
  • Regular phishing simulation exercises
  • Role-specific security training (developers, support, etc.)
  • Privacy and data protection training
  • Incident response drills

Updates to Security Practices

We continuously improve our security posture:

  • Regular security assessments and audits
  • Adoption of new security technologies
  • Response to emerging threats and vulnerabilities
  • Updates based on industry best practices
  • Compliance with evolving regulations

This Security Policy is reviewed and updated regularly. Material changes will be communicated through our platform.

Contact Security Team

For security-related questions or concerns:

Security Team: security@connecty.com

Vulnerability Reports: security@connecty.com

Chief Information Security Officer (CISO): ciso@connecty.com

Address: Connecty Security Team, [Your Business Address]

Related Policies

  • Privacy Policy
  • GDPR Compliance
  • Terms of Service
  • Cookie Policy

Security is an ongoing commitment. While we implement industry-leading security measures, no system is completely secure. We encourage users to practice good security hygiene and report any concerns to our security team.

Connecty

Bringing people together through memorable events and venues

The all-in-one platform for discovering events, creating unforgettable experiences, and booking perfect venues.

Platform

  • Discover Events
  • Find Venues
  • Create Event
  • List Your VenueNEW
  • How It Works
  • Pricing
  • Mobile AppComing Soon

For Organizers

  • Organizer Home
  • Event Planning Guide
  • Templates Gallery
  • Venue Booking
  • Marketing Tools
  • Analytics & Insights
  • Success Stories

For Venue Owners

  • List Your Venue
  • Venue Management
  • Pricing for Venues
  • Venue Success Stories
  • Become a Partner
  • Venue Resources

Resources

  • Help Center
  • Blog
  • Community Forum
  • API Documentation
  • Integrations
  • Event Categories
  • Venue Types
  • Webinars & Training

Company

  • About Us
  • Careers
  • Press & Media
  • Contact Us
  • Partnerships
  • Affiliate Program
  • Trust & Safety

Never Miss an Event

Get curated events, venue tips, and exclusive offers delivered to your inbox

Join 50,000+ subscribers

By subscribing, you agree to our Privacy Policy. Unsubscribe anytime.

© 2024-2025 Connecty, Inc. All rights reserved.

Made with ❤️ in San Francisco

Sitemap
We accept:
SSL Secure
GDPR Compliant
PCI DSS
Privacy PolicyTerms of ServiceCookie PolicyAccessibilityGDPRSecurity