Security Policy

Last Updated: January 5, 2026

Deuce takes the security of our systems and user data seriously. This Security Policy describes the safeguards we use and how to report security issues.

1) Security Principles

We design Deuce with the following principles:

  • Least privilege access to production systems
  • Secure-by-default configurations where possible
  • Minimize collection of sensitive data
  • Monitor for abuse and respond quickly to incidents

2) Encryption

In transit: Data sent between your device and our services is protected using HTTPS (TLS).

At rest: Data stored in our databases and storage providers may be encrypted at rest depending on provider capabilities and configuration.

Note: Deuce uses third-party infrastructure (see "Third-Party Services" below). Their security controls contribute to overall encryption and storage protections.

3) Authentication & Access Control

  • User authentication is handled through an authentication provider (e.g., Clerk).
  • Access to administrative systems is restricted to authorized personnel and protected by strong authentication.
  • We use least-privilege access for production systems where possible.

4) Application & Infrastructure Security

We use a combination of technical and operational controls, which may include:

  • Environment variable / secret management (no hard-coded secrets in the app)
  • Regular dependency updates and patching
  • Logging for operational reliability and abuse detection
  • Rate limiting and abuse prevention controls where applicable

5) Payments (If Offered)

If Deuce offers paid subscriptions or purchases, payment processing is handled by Apple (In-App Purchases) and/or authorized third-party processors. Deuce does not store full payment card information on our servers. We may receive purchase status information (e.g., subscription active/inactive) to provide access.

6) Data Backups & Recovery

We maintain backups and operational safeguards designed to support availability and recovery in the event of service disruption. Backup handling depends on our infrastructure providers and configuration.

7) Vulnerability Reporting (Responsible Disclosure)

If you believe you've found a security vulnerability, please report it to:

Email: courtsidewithisaac@gmail.com

Subject line: "Security Vulnerability Report"

Please include:

  • A clear description of the issue
  • Steps to reproduce (if possible)
  • Impact assessment (what data or systems are affected)
  • Any screenshots/logs that help us confirm the issue

Please do not publicly disclose the vulnerability until we've had a reasonable opportunity to investigate and address it.

Good-faith security research: We will not pursue legal action against researchers who:

  • Act in good faith
  • Avoid privacy violations, data destruction, and service disruption
  • Do not exploit the issue beyond what is necessary to demonstrate it
  • Give us a reasonable time to remediate before public disclosure

8) Security Incident Response

If we confirm a security incident, we work to:

  • Contain and remediate the issue
  • Assess scope and impact
  • Notify affected users when required by law or when appropriate based on risk
  • Implement prevention steps to reduce recurrence

9) Third-Party Services

Deuce relies on third-party providers for core functionality (for example authentication, database/storage, messaging, notifications, and location search). These providers maintain their own security programs and controls. Our key vendors may include:

  • Clerk (authentication)
  • Supabase (database/storage)
  • Stream Chat (messaging)
  • Expo Push Notification Service (push delivery)
  • Google Places API (place search/autocomplete)

10) Updates to This Policy

We may update this Security Policy from time to time. Material changes will be posted on this page with an updated "Last Updated" date.