SECURITY PROGRAM ACTIVE

NEURAL
FIREWALL.

Security Policy for Opsionic automation services. Real controls. Real boundaries. Clear responsibilities.
Last updated: April 19, 2026

01. Scope & Principles

This Security Policy describes how Opsionic protects systems used to deliver automation services and operate this website. It is designed to support confidentiality, integrity, and availability while minimizing unnecessary data exposure.

  • Least-Privilege Access
  • Defense-in-Depth
  • EU Infrastructure (Finland)
  • Secure-by-Default

This page is a security overview. Contractual details for client Processing are defined in the DPA and your project scope.

02. Infrastructure & Hosting

Opsionic operates on a private, secured server located in Finland (EU). Administrative access is restricted and monitored. Systems are maintained using secure configuration practices to reduce attack surface.

  • Hardened Access Controls
  • Monitoring & Security Logs
  • Backup & Recovery
  • Change Control

We avoid exposing internal network details publicly for security reasons. Detailed controls can be shared under NDA for enterprise procurement.

03. Encryption & Transmission

Data transmitted between systems is protected using industry-standard encrypted transport (TLS/SSL) where supported by the connected platforms. Where tokens/keys are required, we apply access minimization and secure handling practices.

  • TLS/SSL in Transit
  • Least-Privilege Tokens
  • Secure Credential Handling
  • Credential Rotation on Request

We do not promise a single encryption algorithm for every integration because third-party platforms differ. We implement the strongest supported option per platform.

04. Data Minimization & Retention

Opsionic designs automations to process the minimum data necessary to achieve the objective. We avoid storing client content unless storage is required for reliability, debugging, or explicitly requested features.

  • Minimal Data by Design
  • Limited Logs
  • Deletion on Completion
  • GDPR-Aligned Practices

Exact retention windows are defined in the Privacy Policy/DPA and may vary by project (e.g., security logs, support evidence, or legal-defense records). We avoid “guaranteed purge in X seconds” promises unless a specific architecture enforces it.

05. Monitoring & Incident Response

We monitor for suspicious activity signals (abnormal access patterns, repeated failures, unusual traffic). If a Security Incident is confirmed, Opsionic follows a structured response process: containment, investigation, remediation, and communication.

  • Detection & Alerting
  • Containment Procedures
  • Root Cause Analysis
  • Client Notification (DPA)

Breach notification timelines are defined in the DPA. We aim to inform clients quickly after verification, without delaying containment and evidence preservation.

06. Subprocessors & Tools

Opsionic uses a minimal set of external tools to run operations safely. For this website and communication: Brevo (email delivery) and Microsoft Clarity (usability analytics) may process limited data under their own security programs and contractual obligations.

  • Vendor Minimization
  • Contractual Controls
  • Access Boundaries
  • Change Notice via DPA

Full subprocessor terms and objection mechanism are documented in the DPA.

07. Client Responsibilities

Security is a shared model. You control the source systems and user permissions. To keep automations secure, clients must enforce strong access hygiene.

  • Use 2FA Where Available
  • Rotate Tokens Periodically
  • Limit Admin Accounts
  • Notify Us of Incidents

If you want, Opsionic can provide a “Client Security Checklist” for your internal team before go-live.

08. Vulnerability Disclosure

If you believe you found a security issue, report it responsibly and privately. Do not publicly disclose until we have a reasonable chance to investigate and mitigate.

  • Email: security@opsionic.com
  • Include Reproduction Steps
  • Include Affected URLs/Systems
  • No Social Media Disclosures

We do not operate a formal bug bounty program at this time. We do, however, treat verified reports seriously and prioritize remediation.

09. Limits of This Policy

This policy describes security intentions and operational practices. It does not create a guarantee that incidents will never occur. Security also depends on third-party platforms, client configurations, and external factors.

  • No Overpromises
  • Clear Boundaries
  • Risk-Based Security
  • Continuous Improvement

Contractual commitments (including incident notification and audit provisions) are defined in signed scopes and the DPA.