Security

Learn about Middle's security protocols

Policies

We have the following security policies in place and can make them available upon request: Acceptable Use, Asset Management, Backup, Business Continuity Plan, Change Management, Code of Conduct, Cryptography, Data Classification, Data Deletion, Data Protection, Disaster Recovery Plan, Incident Response Plan, Information Security, Password, Physical Security, Responsible Disclosure, Risk Assessment, System Access Control, Vendor Management, and Vulnerability Management.

Software

We use Vanta to track compliance with our security policies.

Middle employees

All employees undergo a complete background check and sign an Employee Invention Assignment and Confidentiality Agreement when they join the company. We also track that all employees do the following:

  • Review and accept security policies

  • Install the Vanta agent to monitor their computers

    • The app checks several security-relevant settings, such as whether the hard drive is encrypted and if a password manager is installed.

  • Complete security training

Cloud security

Middle is hosted on Amazon Web Services (AWS). More information on their security can be found on the AWS Security website. We take the following security steps on AWS:

  • Data is encrypted at rest. It is also encrypted in transit with TLS/SSL.

  • Every customer’s data is stored on its own database instance separate from other customers’ data.

Product security

  • Passwords must be a minimum of eight characters and passwords on the Pwned password list cannot be used to create an account.

  • Middle monitors sessions by IP address and time.

  • Access can be granted at the account or sub-account level.

Government

Middle complies with CCPA and GDPR. Requests to review, correct, update, suppress, or delete personal information that Middle maintains about a person can be sent to privacy@middle.app.

Certifications

Middle is working towards SOC2 certification.

Last updated