Security
How Jurybox protects your data and supports secure operations
Security at Jurybox
Protecting customer information is a core operating priority. Our controls are designed around secure access, reliable infrastructure, and continuous monitoring to reduce risk across the platform.
Governance and Access
• Access to production systems is limited by role and least-privilege principles.
• Team members use strong authentication controls, including support for multi-factor authentication.
• Security responsibilities, account lifecycle controls, and incident response procedures are defined and reviewed.
Infrastructure and Data Protection
• Data is encrypted in transit using TLS and protected at rest by managed cloud controls.
• Jurybox is deployed on hardened cloud infrastructure with environment separation and controlled administrative access.
• Backups and recovery procedures are in place to support resilience and business continuity.
Application Security
• Code changes are reviewed before release and deployed through controlled workflows.
• Dependencies and runtime environments are monitored and updated to address known security issues.
• Security events are logged and monitored to help identify and respond to suspicious activity.
Transparency
Additional security documentation is available through our Trust Center.
If your organization has a security review process, contact us at security@juryboxapp.com.
