Information Security Policy

FLUF Connect - Protecting Your Data Across All Marketplaces

1. Company Information

Company Name: FLUF.io

Service: FLUF Connect (Multi-marketplace crosslisting and inventory management platform)

Website: https://fluf.io

Contact Email: [email protected]

Data Protection Officer: [email protected]

2. Data Collection and Processing

2.1 Types of Data We Collect

  • Account Information: Username, email address, encrypted passwords, store names
  • Marketplace Credentials: API tokens and authentication credentials for connected marketplaces (Shopify, Depop, eBay, Etsy)
  • Product Data: Product listings, images, descriptions, prices, inventory levels, SKUs
  • Order Information: Order details, buyer information, transaction data, shipping information
  • Usage Analytics: Platform usage statistics, crosslisting activity, sync logs
  • Technical Data: IP addresses, browser information, device identifiers, session data

2.2 Data Processing Purposes

  • Multi-marketplace product crosslisting and inventory synchronisation
  • Order management and fulfilment coordination
  • Automated offer management and price optimisation
  • Platform analytics and performance monitoring
  • Customer support and technical assistance
  • Service improvement and feature development

Data Minimisation: We only collect and process data that is necessary for providing FLUF Connect services and improving user experience.

3. Technical Security Measures

3.1 Data Encryption

  • Data in Transit: All data transmissions use TLS 1.3 encryption
  • Data at Rest: Database encryption using AES-256 encryption
  • API Credentials: All marketplace API tokens are encrypted using OpenSSL with AES-128-CTR
  • Password Security: User passwords are hashed using WordPress's secure hashing functions

3.2 Infrastructure Security

  • Hosting: Hetzner dedicated server with enterprise-grade security
  • Database: MySQL with regular security updates and access controls
  • Caching: Redis object caching with secure authentication
  • CDN: Cloudflare for DDoS protection and secure content delivery
  • SSL Certificates: Extended validation SSL certificates for all domains

3.3 Access Controls

  • Authentication: Multi-factor authentication for administrative access
  • Authorisation: Role-based access control (RBAC) for different user levels
  • API Security: Rate limiting and authentication for all API endpoints
  • Session Management: Secure session handling with automatic expiration

4. Marketplace Integration Security

4.1 API Security

  • OAuth 2.0: Secure authentication with Shopify, eBay, and Etsy
  • API Rate Limiting: Compliance with marketplace rate limits to prevent service disruption
  • Token Management: Secure storage and automatic refresh of API tokens
  • Webhook Security: Verification of webhook signatures for authentic data

4.2 Data Synchronisation

  • Real-time Sync: Secure inventory and order synchronisation across platforms
  • Error Handling: Comprehensive error logging and recovery mechanisms
  • Data Validation: Input validation and sanitisation for all marketplace data
  • Audit Trails: Complete logging of all synchronisation activities

Marketplace Compliance: We maintain compliance with security requirements for all integrated marketplaces including Shopify, Depop, eBay, and Etsy.

5. Data Retention and Deletion

5.1 Retention Periods

  • Account Data: Retained for the duration of active service plus 2 years
  • Product Data: Retained while products are active plus 1 year for analytics
  • Order Data: Retained for 7 years for accounting and legal compliance
  • Sync Logs: Retained for 12 months for troubleshooting and analytics
  • Technical Logs: Retained for 90 days for security monitoring

5.2 Data Deletion

  • Account Deletion: Complete data removal within 30 days of account closure
  • Right to be Forgotten: Data deletion upon user request within 30 days
  • Automated Cleanup: Regular automated deletion of expired data
  • Secure Deletion: Multi-pass overwriting for sensitive data removal

6. Privacy and Compliance

6.1 Regulatory Compliance

  • GDPR: Full compliance with EU General Data Protection Regulation
  • CCPA: California Consumer Privacy Act compliance
  • UK GDPR: UK data protection law compliance
  • PCI DSS: Payment Card Industry Data Security Standard compliance

6.2 Data Subject Rights

  • Right to Access: Users can request copies of their personal data
  • Right to Rectification: Users can correct inaccurate personal data
  • Right to Erasure: Users can request deletion of their personal data
  • Right to Portability: Users can export their data in standard formats
  • Right to Object: Users can opt-out of certain data processing activities

6.3 Third-Party Integrations

  • Marketplace APIs: Data sharing limited to necessary crosslisting functions
  • Payment Processors: Secure integration with Stripe for subscription management
  • Analytics Services: Anonymised data sharing for platform improvement
  • Support Tools: Minimal data sharing for customer support purposes

7. Incident Response and Monitoring

7.1 Security Monitoring

  • 24/7 Monitoring: Continuous monitoring of system security and performance
  • Intrusion Detection: Automated detection of suspicious activities
  • Log Analysis: Regular analysis of security logs and access patterns
  • Vulnerability Scanning: Regular security assessments and penetration testing

7.2 Incident Response

  • Response Team: Dedicated security incident response team
  • Response Time: Initial response within 4 hours of detection
  • User Notification: Affected users notified within 72 hours
  • Regulatory Reporting: Compliance with data breach notification requirements

7.3 Business Continuity

  • Backup Systems: Daily encrypted backups with 30-day retention
  • Disaster Recovery: Comprehensive disaster recovery plan with RTO < 4 hours
  • Failover Systems: Automatic failover for critical services
  • Data Recovery: Point-in-time recovery capabilities

8. Employee Security and Training

8.1 Access Management

  • Principle of Least Privilege: Employees have minimum necessary access
  • Regular Access Reviews: Quarterly review of employee access permissions
  • Secure Development: Security-focused development practices and code reviews
  • Background Checks: Security clearance for employees with data access

8.2 Training and Awareness

  • Security Training: Regular security awareness training for all staff
  • Privacy Training: Specific training on data protection and privacy laws
  • Incident Response Training: Regular drills and response training
  • Secure Coding: Security-focused development training and best practices

9. System Updates and Maintenance

9.1 Security Updates

  • Regular Updates: Monthly security patches and system updates
  • Critical Patches: Emergency patches applied within 48 hours
  • Dependency Management: Regular updates of third-party libraries and dependencies
  • Security Testing: Comprehensive testing before deployment

9.2 Maintenance Windows

  • Scheduled Maintenance: Monthly maintenance windows during off-peak hours
  • User Notification: 48-hour advance notice for planned maintenance
  • Rollback Procedures: Immediate rollback capability for failed updates
  • Performance Monitoring: Continuous monitoring during and after updates

10. Security Compliance Framework

10.1 Network Security and Segregation

Network Segregation: Yes, our organisation enforces network segregation through Hetzner dedicated server infrastructure. Our hosting environment implements:

  • Isolated Application Containers: Each application runs in isolated containers with restricted network access
  • Firewall Protection: Advanced firewall rules prevent unauthorised network access
  • DDoS Protection: Cloudflare integration provides comprehensive DDoS protection and threat monitoring
  • Network Monitoring: 24/7 network monitoring with real-time threat detection and prevention
  • VPN Access: Secure VPN access for administrative functions

10.2 Endpoint Security

Anti-virus Protection: Yes, our organisation implements comprehensive endpoint security:

  • Enterprise Anti-virus: All company endpoints have enterprise-grade anti-virus software installed and regularly updated
  • Real-time Scanning: Continuous real-time threat detection and removal
  • Centralised Management: Centrally managed security policies across all endpoints
  • Regular Updates: Automatic virus definition updates and security patches
  • Quarantine Procedures: Automatic isolation and remediation of detected threats

10.3 Security Baseline for Daily Operations

Security Baseline Implementation: Yes, our organisation implements a comprehensive security baseline including:

  • Screen Locking: Automatic screen locks after 10 minutes of inactivity on all devices
  • Password Complexity: Enforced password complexity requirements (minimum 12 characters, mixed case, numbers, special characters)
  • Multi-Factor Authentication: MFA required for all administrative access and sensitive systems
  • Clear Desk Policy: Implemented clear desk policy with secure storage of sensitive documents
  • Device Encryption: Full disk encryption on all company devices
  • Secure Boot: Secure boot enabled on all company hardware
  • USB Restrictions: Controlled USB device access and data loss prevention

10.4 Access Control Policy

Published Access Control Policy: Yes, our organisation maintains a published access control policy based on the principle of least privilege:

  • Role-Based Access Control (RBAC): Granular permissions based on job functions and responsibilities
  • Principle of Least Privilege: Users granted minimum access necessary for their role
  • Regular Access Reviews: Quarterly reviews of user permissions and access rights
  • Automated Provisioning: Automated user provisioning and de-provisioning processes
  • Segregation of Duties: Critical functions require multiple authorisations
  • Personal Data Access: Strict controls on personal data access with audit logging

10.5 Data Classification and Encryption Policy

Published Data Classification Policy: Yes, our organisation maintains comprehensive data classification and encryption policies:

  • Data Classification Levels: Public, Internal, Confidential, and Restricted classifications
  • Encryption in Transit: TLS 1.3 encryption for all data transmissions
  • Encryption at Rest: AES-256 encryption for all stored sensitive data
  • Key Management: Secure cryptographic key management and rotation
  • Data Handling Procedures: Specific procedures for each classification level
  • Regular Policy Updates: Annual review and update of classification policies

10.6 Incident Response Policy

Published Incident Response Policy: Yes, our organisation maintains a comprehensive incident response policy with:

  • Clear Roles and Responsibilities: Defined incident response team with specific roles
  • Incident Classification: Structured incident severity and classification system
  • Response Procedures: Step-by-step response procedures for different incident types
  • Communication Channels: Established internal and external communication protocols
  • Escalation Procedures: Clear escalation paths based on incident severity
  • Post-Incident Review: Mandatory post-incident analysis and improvement processes
  • Regulatory Compliance: Procedures ensure compliance with breach notification requirements

10.7 Vulnerability and Threat Management

Vulnerability Management Procedure: Yes, our organisation has established vulnerability and threat management procedures:

  • Regular Vulnerability Scanning: Automated weekly vulnerability scans of all systems
  • Penetration Testing: Annual third-party penetration testing and security assessments
  • Threat Intelligence: Integration with threat intelligence feeds for proactive threat detection
  • Patch Management: Systematic patch management with risk-based prioritisation
  • Security Monitoring: 24/7 security monitoring with SIEM integration
  • Risk Assessment: Regular risk assessments and security posture evaluations

10.8 Internal Personal Data Protection Policy

Internal Data Protection Policy: Yes, our organisation maintains an internal personal data protection policy that is regularly updated:

  • GDPR Compliance: Full compliance with EU General Data Protection Regulation
  • Regular Updates: Policy reviewed and updated quarterly or when regulations change
  • Staff Training: Mandatory annual data protection training for all employees
  • Data Processing Records: Comprehensive records of all personal data processing activities
  • Privacy by Design: Privacy considerations integrated into all system design and development
  • Data Subject Rights: Procedures for handling all data subject rights requests
  • Cross-Border Transfers: Specific procedures for international data transfers

Security Contact Information

For security-related inquiries, vulnerabilities, or incidents:

Email: [email protected]

Privacy Officer: [email protected]

General Support: [email protected]

Response Time: Security issues acknowledged within 24 hours

Last Updated: April 29, 2026

This policy is reviewed and updated regularly to ensure continued compliance and security.

Scroll to Top