Data Security
We take the security of your data seriously. While Reschematic is designed for early-stage project modeling, we use modern, secure infrastructure to protect platform access and account-level information at every step.
Trusted Infrastructure
Reschematic is hosted on infrastructure providers that maintain strong compliance standards, including SOC 2 and ISO 27001. All platform traffic is encrypted over HTTPS, and user authentication is handled through a secure identity layer. We rely on modern platform-as-a-service providers to ensure patches, upgrades, and security best practices are implemented continuously.
Our Approach
We follow the principle of minimal data collection. The only personal information we store is used for authentication, billing, and managing your account. Model data is stored securely and is never shared publicly or with third parties unless legally required.
Responsible Use
To maintain the security and reliability of the platform, users must not input sensitive, confidential, or regulated data into Reschematic. This includes personally identifiable information (PII), protected health information (PHI), or financial data governed by regulatory compliance requirements. The platform is not designed or certified to store such information.
Platform Expectations
Reschematic is a tool for early-stage project evaluation. It is not intended to be used as a storage solution for confidential inputs or outputs. All data submitted is handled with care, but users are responsible for ensuring their use of the platform complies with their own data handling policies.
Questions?
If you have any questions about how we manage security or would like to report a concern, reach out to us at hello@reschematic.com.