Security & Compliance
Your data belongs to your church. We protect it with encryption, strict roles, audit trails, and privacy controls.
Security Features
Encryption in Transit & at Rest
All data is encrypted using industry-standard TLS 1.3 for transmission and AES-256 for storage.
Role-Based Access Control (RBAC)
Granular permissions system ensures users only see and modify data they're authorized to access.
Audit Logs
Comprehensive logging of all data access and modifications for accountability and compliance.
Privacy Levels
Individual members can control their data visibility with customizable privacy settings.
XSS & CSRF Protection
Built-in protections against cross-site scripting and cross-site request forgery attacks.
Soft Delete & Data Recovery
Deleted data is soft-deleted and recoverable for 30 days, preventing accidental data loss.
Rate Limiting & Validation
API rate limiting and input validation prevent abuse and ensure data integrity.
Infrastructure Security
Hosted on enterprise-grade infrastructure with automatic backups and disaster recovery.
Architecture & Best Practices
Infrastructure
Relius is built on modern, secure cloud infrastructure with automatic scaling, redundancy, and backups:
- Multi-region data replication
- Automated daily backups
- 99.9% uptime SLA (Enterprise)
- DDoS protection
- Load balancing & auto-scaling
- Disaster recovery procedures
Application Security
Every layer of Relius is designed with security in mind:
- Input sanitization and validation
- SQL injection prevention
- Secure API design
- Rate limiting on all endpoints
- Dependency scanning
- Security headers (CSP, HSTS)
Data Stewardship
We take the responsibility of managing church data seriously:
- Data ownership remains with your church
- Export your data anytime
- No data selling or third-party sharing
- Transparent privacy policies
- Member consent management
- Complete data deletion on request
Compliance & Best Practices
Data Protection
- ✓GDPR compliant data handling
- ✓Right to access and deletion
- ✓Data portability options
- ✓Consent management
- ✓Privacy-by-design architecture
Security Practices
- ✓Regular security audits
- ✓Penetration testing
- ✓Vulnerability scanning
- ✓Security patch management
- ✓Incident response plan
Access Control
- ✓Multi-factor authentication (planned)
- ✓Session management
- ✓Password complexity requirements
- ✓Automatic session timeout
- ✓IP whitelisting (Enterprise)
Responsible AI
Our AI features follow strict ethical guidelines: all data is anonymized before processing, AI outputs require human review before sending, and individual privacy settings are always respected. We believe AI should augment ministry, not replace the human touch.
