Glossa
Information Security Policy

Last updated: January 2026

1. Purpose and Scope

This Information Security Policy establishes the security framework for Glossa AI ("Glossa" or "the Company") to protect customer data, intellectual property, and system integrity. This policy applies to all Glossa systems, services, employees, contractors, and third-party service providers involved in the delivery of the Glossa platform.

2. Security Governance

2.1 Roles and Responsibilities

Alison Meyer, COO, serves as Chief Information Security Officer (CISO) with the following responsibilities:

  • Oversight and implementation of all security controls

  • Security incident response coordination

  • Vendor and subprocessor security assessment

  • Compliance monitoring and reporting

  • Annual security policy review and updates

2.2 Policy Review

This policy is reviewed annually and updated as necessary to address evolving threats, regulatory requirements, and business needs. Updated versions of this policy are published on the Glossa website at glossapro.ai/security-policy.

3. Data Security

3.1 Data Classification

Glossa classifies data into the following categories:

  • Customer Personal Data: Personal information provided by customers including names, email addresses, and professional information

  • Customer Content: Project data, requirements, transcripts, documents, and other materials uploaded or generated through the platform

  • System Data: Usage data, logs, and analytics used for platform operation and improvement

  • Confidential Business Information: Proprietary source code, business plans, and internal documentation

3.2 Encryption Standards

  • Data at Rest: All customer data is encrypted using AES-256 encryption

  • Data in Transit: All data transmissions use TLS 1.2 or higher (TLS 1.3 preferred)

  • Application-Level Encryption: Sensitive fields receive additional encryption layers where applicable

3.3 Data Retention and Deletion

  • Customer data is retained only as long as necessary to provide services or as required by applicable law

  • Customers may request deletion of their data at any time by contacting support@glossapro.ai

  • Upon account termination, customer data is deleted within 60 days unless retention is required by law

  • Backup data is encrypted and automatically purged according to retention schedules

4. Access Control

4.1 Authentication

  • Single Sign-On (SSO) is implemented via WorkOS for centralized identity management

  • Multi-Factor Authentication (MFA) is available and can be required by enterprise customers

4.2 Role-Based Access Control (RBAC)

  • Access to systems and data is granted based on the principle of least privilege

  • User permissions are assigned according to job function and business need

4.3 Access Monitoring

  • All authentication events and system access are logged with timestamps

  • Audit logs track access to sensitive data and administrative functions

5. Infrastructure Security

5.1 Cloud Infrastructure

Glossa leverages enterprise-grade cloud infrastructure providers with robust security controls:

  • Google Cloud Platform: For storage, AI/ML services, and compute resources

  • Supabase: For PostgreSQL database with built-in security features

  • Vercel: For secure web hosting and deployment

5.2 Network Security

  • Network traffic is encrypted using industry-standard protocols

5.3 Backup and Disaster Recovery

  • Automated encrypted backups are performed regularly and stored in geographically redundant locations

  • Disaster recovery procedures include automated failover capabilities

5.4 Cloud Service Governance

Evaluation and Selection
  • Cloud services that will process customer data must be evaluated for security controls, compliance certifications, and data protection capabilities before adoption

  • Preference is given to providers with SOC 2, ISO 27001, or equivalent certifications

  • All cloud service providers must execute appropriate data processing or security agreements

Approved Services
  • The current list of approved cloud infrastructure and service providers is documented in Section 8.2 (Approved Subprocessors)

  • New cloud services must be reviewed and approved by the CISO before implementation

Data Protection Requirements
  • All cloud services handling customer data must support encryption at rest (AES-256) and in transit (TLS 1.2+)

  • Cloud services must provide audit logging and access controls

  • Data residency requirements must be evaluated for services processing personal data subject to GDPR or other regional regulations

Exit and Migration
  • Cloud service contracts must include provisions for data export and deletion upon termination

  • Customer data must be fully retrievable in standard formats

  • Upon exit from a cloud service, all customer data must be securely deleted or migrated to an approved alternative

6. Application Security

6.1 Secure Development Practices

  • Infrastructure is managed through Infrastructure as Code (IaC) with version control

  • Security best practices are followed throughout the software development lifecycle

6.2 Vulnerability Management

  • Security patches and updates are applied promptly based on risk assessment

  • Critical vulnerabilities are remediated as quickly as possible based on severity and exploitability

7. Security Monitoring and Incident Response

7.1 Event Logging and Monitoring

  • Security-relevant events including authentication attempts, privilege changes, and data access are logged

  • Logs are centralized, time-stamped, and protected against tampering

  • Continuous monitoring detects anomalies and potential security incidents

  • PostHog is used for product analytics with pseudonymized customer identifiers

7.2 Incident Response Procedures

In the event of a security incident:

  • Detection and Containment: Incidents are identified through monitoring systems and immediately contained to prevent further impact

  • Investigation: The CISO leads investigation to determine scope, root cause, and affected systems

  • Notification: Affected customers are notified within 72 hours when Personal Data is involved, in compliance with GDPR and applicable data protection laws

  • Remediation: Security controls are strengthened to prevent recurrence

  • Documentation: All incidents are documented with lessons learned and remediation actions

7.3 Contact Information

Security incidents should be reported immediately to: support@glossapro.ai

8. Third-Party Security

8.1 Subprocessor Requirements

All third-party service providers (subprocessors) that handle customer data must:

  • Maintain security controls appropriate to the sensitivity of data processed

  • Comply with applicable data protection laws including GDPR

  • Execute data processing agreements with appropriate security obligations

  • Notify Glossa of any security incidents affecting customer data

8.2 Approved Subprocessors

The current list of approved subprocessors includes:

Google/United States/Cloud storage and AI/ML services

Supabase/United States/Database services

WorkOS/United States/Identity and authentication

Vercel/United States/Web hosting and deployment

Trigger.dev/United Kingdom/Background job orchestration

Pipedream/United States/Integration platform

PostHog/United States/Product analytics and monitoring

9. Compliance

9.1 Regulatory Compliance

Glossa maintains compliance with applicable data protection regulations:

  • GDPR: EU General Data Protection Regulation for European customer data

  • CCPA/CPRA: California Consumer Privacy Act for California residents

9.2 Data Processing Agreements

Glossa executes Data Processing Agreements (DPAs) with customers processing personal data under GDPR, incorporating Standard Contractual Clauses for international data transfers.

10. Acceptable Use Policy

This Acceptable Use Policy defines the rules and responsibilities for accessing and using Glossa systems, infrastructure, and customer data.

10.1 Authorized Use

  • Access to Glossa systems and customer data is granted solely for business purposes related to providing and maintaining the Glossa platform

  • Users must only access systems and data for which they have been explicitly authorized

  • Credentials and access privileges are personal and must not be shared with others

  • Users must protect the confidentiality of their authentication credentials (passwords, API keys, access tokens)

10.2 Prohibited Activities

Users must not:

  • Access, use, or disclose customer data for any purpose other than providing the Glossa service

  • Attempt to access systems, accounts, or data for which they lack authorization

  • Share, transfer, or disclose authentication credentials to any other person

  • Disable, circumvent, or interfere with security controls or monitoring systems

  • Install unauthorized software or make unauthorized modifications to Glossa infrastructure

  • Use Glossa systems for illegal activities or in violation of applicable laws

  • Engage in activities that could compromise the security, integrity, or availability of Glossa systems

10.3 Data Handling Requirements

  • Customer data must be handled in accordance with our Data Processing Agreement and Privacy Policy

  • Customer data must not be downloaded to personal devices or systems unless required for authorized work and properly secured

  • Customer data must not be transmitted via unencrypted channels

  • Upon termination of employment or contract, all Glossa data and credentials must be returned or destroyed

10.4 Security Incident Reporting

Users must immediately report to support@glossapro.ai:

  • Suspected security incidents or data breaches

  • Lost or compromised credentials

  • Suspicious system activity or unauthorized access attempts

  • Any violation of this Acceptable Use Policy

10.5 Monitoring and Enforcement

  • Glossa reserves the right to monitor system access and usage to ensure compliance with this policy

  • Violations of this policy may result in immediate suspension of access, termination of employment or contract, and potential legal action

  • Glossa will cooperate with law enforcement in investigating any illegal activities

11. Policy Violations

Violations of this policy may result in disciplinary action up to and including termination of employment or contract. Suspected security violations should be reported immediately to support@glossapro.ai.