Information security
1. Introduction
At Mister Pato, including the development and operation of the Patometer platform, we are committed to protecting the confidentiality, integrity, and availability of the information processed within our systems.
This policy outlines the technical and organizational measures implemented to ensure the security of data, particularly in the context of integrations with third-party services and platforms.
2. Scope
This policy applies to:
- Systems developed and maintained by Mister Pato
- Web applications, APIs, and integrations (including TikTok Shop, Holded, and other third-party services)
- Cloud infrastructure used to deploy services
- Data processed on behalf of clients
3. Access Control
Access to systems and data is restricted following the principle of least privilege:
- Access is limited to authorized personnel only
- Individual credentials are required
- Secure password management practices are enforced
- Multi-factor authentication (MFA) is used where applicable
- Access is revoked when no longer necessary
4. Credential and Secret Management
- API keys, tokens, and credentials are stored securely
- Sensitive credentials are never exposed in source code or public environments
- Environment variables or secure configuration systems are used
- Credentials are rotated when necessary
5. Encryption and Communications
- All communications are secured using HTTPS (TLS)
- Transmission of sensitive data in plain text is avoided
- Data in transit is protected using secure protocols
- Industry best practices for SSL/TLS configuration are applied
6. Infrastructure and Hosting
Services are hosted on trusted cloud providers:
- Scaleway
- DigitalOcean
These providers offer:
- Secure data centers
- Network protection
- Resource isolation
- Physical and logical security controls
Additionally:
- Security updates are applied regularly
- Firewalls and restrictive network configurations are implemented
- Systems are monitored for availability and security
7. Application Security
Applications are developed following secure coding best practices:
- Input validation is enforced
- Protection against common vulnerabilities (OWASP Top 10)
- Secure session management
- Authentication and authorization controls
- Use of established frameworks (such as Django)
8. Backup and Recovery
- Regular backups of data are performed
- Backups are stored securely
- Recovery procedures are in place
- Restoration processes are periodically tested
9. Monitoring and Detection
- Relevant system events are logged
- Access and anomalous activity are monitored
- Preventive measures are applied to detect unauthorized access
- Logs are reviewed in case of incidents
10. Security Incident Management
In the event of a security incident:
- The incident is analyzed to determine scope and origin
- Containment and mitigation measures are applied
- Affected systems are restored if necessary
- Affected clients are notified when appropriate
- Legal obligations (including GDPR) are fulfilled
11. Data Protection and Privacy
- Only necessary data is accessed and processed
- Measures are in place to prevent unauthorized access
- Clients may request deletion of their data
- Applicable data protection regulations are respected
For more information, please refer to our Privacy Policy
12. Third-Party Integrations
When integrating with external platforms:
- Secure authentication mechanisms are used (OAuth, API keys)
- Data is processed solely for functional service purposes
- Data is not shared with unauthorized third parties
- Platform-specific policies and requirements are respected
13. Data Retention
- Data is retained only for as long as necessary
- Data is deleted when no longer required or upon client request
- Measures are in place to prevent unnecessary retention
14. Review and Continuous Improvement
This policy is periodically reviewed to:
- Adapt to emerging threats
- Improve existing controls
- Ensure compliance with platform and regulatory requirements
15. Contact
For any questions related to information security:
soy@misterpato.es