Backboard Public Security Declaration
Backboard is committed to protecting customer data and delivering secure services. Our security practices are designed to align with industry expectations for data protection, access control, monitoring, and incident readiness. The following summarizes key security commitments we make publicly:
Data Protection
Encryption
All data within Backboard is protected using encryption in transit and at rest according to modern best practices. Encryption safeguards data as it moves between systems and while stored on our infrastructure. Backboard
Access Control
Authentication and Authorization
Access to systems and data is controlled through defined authentication mechanisms that enforce appropriate permissions and restrict access to authorized users only. Role-based controls ensure that users and services have access only to the resources they require. Backboard
Operational Monitoring
Continuous Monitoring and Logging
Backboard maintains continuous monitoring of its operational environment. Logging and alerting systems are used to detect anomalous behavior and support timely response activities. Backboard
Incident Preparedness
Incident Response
Backboard has documented processes for identifying, evaluating, and responding to potential security events. These processes are designed to support clear escalation and resolution pathways. Backboard
Data Lifecycle Management
Retention and Deletion Policies
We apply formal data retention and deletion policies to ensure that information is stored only for as long as necessary and securely deleted when no longer needed. Backboard
Development and SDLC Practices
Secure Development
Security is integrated into Backboard’s development lifecycle through code review practices and standard quality controls that help minimize vulnerabilities before deployment. Backboard
Customer Transparency
Trust Center
Backboard maintains a public Trust Center that outlines its security controls, privacy practices, and compliance commitments. This resource is available for current and prospective customers seeking an overview of our approach to protecting data and operations.
