Last Updated: November 19, 2025
At PoolVerify, we take the security of your data seriously. This page outlines the security measures we implement to protect your inspection data, client information, and account details.
We employ industry-standard security practices and work with trusted, security-focused service providers to ensure your data remains secure and private.
TLS 1.3 in transit, AES-256 at rest
Row-Level Security policies protect your data
Hosted on AWS via trusted providers
All data transmitted between your browser and our servers is encrypted using:
Your data is encrypted when stored in our databases and file storage:
We use Clerk, a security-focused authentication provider, to manage user accounts:
Your data is isolated from other users through multiple security layers:
Within your organization, we support multiple user roles with different permission levels:
PoolVerify is built on secure, enterprise-grade cloud infrastructure:
Our application code follows security best practices:
Your data is backed up automatically to protect against data loss:
We maintain a disaster recovery plan to ensure business continuity:
Important: While we maintain comprehensive backups, we recommend you regularly download copies of critical inspection reports. You remain responsible for maintaining your own backups of important data.
We carefully select security-focused service providers and ensure they maintain appropriate security standards:
All third-party providers are contractually obligated to protect your data and have Data Processing Agreements in place that meet California privacy law requirements.
We maintain comprehensive logs to monitor system security and detect suspicious activity:
We actively monitor for security threats and anomalies:
In the event of a security incident, we follow a defined response process:
We maintain a proactive approach to security updates:
We comply with applicable privacy laws and regulations:
Under California privacy law, you have the right to:
See our Privacy Policy for detailed information about your privacy rights and how to exercise them.
In the unlikely event of a data breach affecting personal information:
Breach Notification: If your data is compromised in a breach, we will notify you via email with details about the incident, what information was affected, and steps you should take to protect yourself.
Security is a shared responsibility. You can help keep your account secure by:
We welcome security researchers and users who discover potential security vulnerabilities to report them responsibly.
Security Contact:
Please include "Security Vulnerability Report" in the subject line
When reporting a security vulnerability, please provide:
When you report a security vulnerability to us, we commit to:
When conducting security research, please:
PoolVerify follows recognized industry security frameworks and best practices:
Important Disclaimer: While we implement robust security measures, no system is 100% secure. We cannot guarantee absolute security, and we are not liable for security breaches resulting from factors beyond our reasonable control.
Security is an ongoing process, and we continuously work to improve our security posture. We encourage you to report any security concerns you may have.
For security questions, concerns, or to report a vulnerability, please contact us:
PoolVerify Security Team
Email: support@poolverify.io
For vulnerability reports, include "Security Vulnerability Report" in the subject line
Last Security Review: November 2025
This security page is updated regularly to reflect our current security practices and any significant changes to our infrastructure or processes.