← Back to home

Legal

Security

Follix is built for freelancers and agencies who trust us with follow-up context and commercial data. This page summarizes how we approach security; it is not an exhaustive audit report.

Transport and hosting

Data in transit is protected using HTTPS (TLS). Our application infrastructure is operated on reputable cloud providers with industry-standard physical and network controls.

Authentication

Access to Follix requires a valid user account. Passwords are handled using established practices (hashed storage; we do not store plaintext passwords). Session tokens are used to keep you signed in securely.

Data storage

Lead and account data you enter is stored in managed databases with access restricted to operational needs. We minimize data collection to what is required to run the follow-up workflow you configure.

Payments

Payment card data is processed by our payment processor; we do not store full card numbers on Follix servers.

Your responsibilities

Security is shared: use a strong unique password, protect your devices, and revoke access when team members leave. Report suspected unauthorized access promptly via Contact Support.

Vulnerability disclosure

If you believe you have found a security vulnerability in Follix, please email security@follix.io with enough detail to reproduce the issue. We appreciate responsible disclosure.

Privacy

For how we collect and use personal data, see our Privacy Policy.