Your Security is Our Priority
We understand the sensitive nature of the information you trust us with. That's why we've built Grief Bridge with security at its core.
How We Protect Your Data
End-to-End Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Your sensitive information is protected at every step.
Secure Authentication
We use Clerk, a leading authentication provider, with support for multi-factor authentication, magic links, and social sign-in for secure account access.
Secure Infrastructure
Hosted on Vercel with enterprise-grade security, automatic DDoS protection, and globally distributed edge network for reliability.
Privacy by Design
We collect only essential data needed to provide our service. You control your data and can export or delete it at any time.
Role-Based Access
Fine-grained permission controls let you decide exactly who can access what. Family members only see what you explicitly share.
Regular Security Audits
We continuously monitor our systems and conduct regular security assessments to identify and address potential vulnerabilities.
Our Security Commitments
Your Data is Yours
We never sell your personal information. Your data belongs to you, and you can export or delete it at any time.
Transparent Practices
We're open about how we collect, use, and protect your information. Read our detailed Privacy Policy for full transparency.
Minimal Data Collection
We only collect information necessary to provide our service. We don't track you across the web or build advertising profiles.
Secure Defaults
Security features like strong passwords and session management are enabled by default. We make the secure choice the easy choice.
Technical Security Measures
Data Protection
- TLS 1.3 encryption for all data in transit
- AES-256 encryption for data at rest
- Secure document storage with access controls
- Regular automated backups with encryption
Access & Authentication
- Multi-factor authentication (MFA) support
- Secure session management with automatic timeout
- Role-based access control (RBAC)
- OAuth 2.0 for third-party authentication
Report a Security Issue
If you discover a security vulnerability, please report it responsibly. We appreciate your help in keeping Grief Bridge secure.
security@griefbridge.comHave questions about our security practices?