Back to home
Last updated: February 20, 2026
Security Overview
PermitSmash, provided by Flintime Inc. ("Flintime," "we," or "us"), is built with security in mind. This page summarizes our current controls.
Hosting and infrastructure
- Hosted on modern cloud providers with physical security, redundancy, and DDoS protections.
- Network segmentation and least-privilege access for services and data.
Data protection
- Encryption in transit (HTTPS/TLS) and at rest for databases and storage.
- Passwords stored using industry-standard hashing by our authentication provider.
- We do not store full card numbers or CVV.
Access controls
- Role-based access for internal tools and production systems.
- Multi-factor authentication enforced for sensitive systems where supported.
- Principle of least privilege for engineers and administrators.
Monitoring and logging
- Application and infrastructure logging with alerting for anomalies.
- Audit trails for key administrative actions.
Backups and continuity
- Regular database backups with tested restore procedures.
- Redundant infrastructure to reduce downtime risk.
Incident response
- Defined runbooks for incident triage, containment, and remediation.
- User notification for incidents as required by law or when appropriate.
Responsible disclosure
If you believe you have found a security issue, email us with details so we can investigate and remediate. Please avoid public disclosure until we have addressed the issue.
Email: support@PermitSmash.com