Backboard Public Security Declaration

Last updated on 10 December 2025


Backboard is committed to protecting customer data and delivering secure services. Our security practices are designed to align with industry expectations for data protection, access control, monitoring, and incident readiness. The following summarizes key security commitments we make publicly:

Data Protection

Encryption

  • All data within Backboard is protected using encryption in transit and at rest according to modern best practices. Encryption safeguards data as it moves between systems and while stored on our infrastructure. Backboard

Access Control

Authentication and Authorization

  • Access to systems and data is controlled through defined authentication mechanisms that enforce appropriate permissions and restrict access to authorized users only. Role-based controls ensure that users and services have access only to the resources they require. Backboard

Operational Monitoring

Continuous Monitoring and Logging

  • Backboard maintains continuous monitoring of its operational environment. Logging and alerting systems are used to detect anomalous behavior and support timely response activities. Backboard

Incident Preparedness

Incident Response

  • Backboard has documented processes for identifying, evaluating, and responding to potential security events. These processes are designed to support clear escalation and resolution pathways. Backboard

Data Lifecycle Management

Retention and Deletion Policies

  • We apply formal data retention and deletion policies to ensure that information is stored only for as long as necessary and securely deleted when no longer needed. Backboard

Development and SDLC Practices

Secure Development

  • Security is integrated into Backboard’s development lifecycle through code review practices and standard quality controls that help minimize vulnerabilities before deployment. Backboard

Customer Transparency

Trust Center

  • Backboard maintains a public Trust Center that outlines its security controls, privacy practices, and compliance commitments. This resource is available for current and prospective customers seeking an overview of our approach to protecting data and operations.