Compliance & Security
At LaTeX Cloud Studio, we take security and privacy seriously. This page explains our approach and the controls we use. For the authoritative legal terms, please refer to our Privacy Policy and Cookie Policy.
Data Protection & GDPR Compliance
We aim to comply with applicable data protection laws, including the General Data Protection Regulation (GDPR), where they apply. In practice, that means we design the service and our processes to support:
- Data minimization: Collecting and processing only what we need to operate and improve the service
- Purpose limitation: Using data only for defined purposes
- User rights requests: Supporting access, correction, deletion, and portability requests where applicable
- Privacy by Design: Data protection is built into our systems from the ground up
- Vendor management: Using vetted service providers and contractual safeguards where required
Infrastructure Security
Data Centers
- EU data hosting for our web product infrastructure
- Physical and operational security controls provided by our hosting providers
Network Security
- Encryption in transit (TLS) for the website and API traffic
- DDoS and abuse protections at the edge (provider-managed)
- Ongoing security patching and dependency vulnerability monitoring
Application Security
Access Controls
- Principle of least privilege for internal access
- Security review for changes that affect data access paths
Data Encryption
- Encryption in transit (TLS)
- Encryption at rest and key management as supported by our infrastructure and storage providers
Compliance & Assurance
Depending on your organization, you may need assurance artefacts (for example, for procurement or institutional review). Please contact us and we can share what is currently available.
- GDPR: We design for GDPR obligations (lawful bases, transparency, and user rights)
- Cookies/consent: Optional analytics and marketing cookies are disabled until you opt in
Security Practices
Development Security
- Secure development practices and code review
- Regular code reviews and static analysis
- Dependency scanning for vulnerabilities
- Security training for all developers
Operational Security
- Monitoring and alerting for service health
- Incident response procedures
- Employee background checks
- Principle of least privilege
Vulnerability Management
We accept vulnerability reports and work to remediate issues in a timely manner.
- Regular vulnerability scanning
- Timely patching of identified vulnerabilities
- Responsible disclosure via email
Third-Party Services
We use third-party service providers to operate the service (for example infrastructure, email delivery, and analytics). Details about analytics cookies and tracking are described in our Cookie Policy and Privacy Policy.
- Vendors are selected based on security and reliability requirements
- Contractual and technical safeguards are applied where required
Contact
Email us at LaTeX@hirox-software-solutions.com for security concerns, vulnerability reports, or compliance/privacy questions.