1. Compliance
This agreement ensures we comply with local privacy laws, including the Personal Data Protection Law (PDPL) in Saudi Arabia[cite: 59].2. What Data We Process
- Purpose: Scanning your software for security vulnerabilities[cite: 62].
- What we scan: Code metadata and user account details[cite: 63].
- Whose data: Your developers and admin users[cite: 64].
- Data types: Names, email addresses, IP addresses, and login credentials[cite: 65].
3. Security Protections
We protect your data using strict security rules:- Encryption: Data is encrypted while stored (AES-256) and while moving across the internet (TLS 1.2+)[cite: 70].
- Access Control: We use Multi-Factor Authentication (MFA) and strict role-based access limits[cite: 71].

