LaTeXCloud Studio Logo
  • Solutions
    • For Students
    • For Researchers
    • For Business
  • Features
  • Pricing
  • About
  • Resources
  • Solutions
  • Features
  • Pricing
  • About
  • Resources
  • enEnglish
  • deDeutsch
  • frFrançais
  • zh中文
LoginSign UpGet Started
LaTeXCloud Studio Logo

Pages

  • Home
  • Pricing
  • Solutions
  • About

Alternatives

  • OpenAI Prism
  • Overleaf
  • Papeeria

Legal

  • Privacy Policy
  • Cookie Policy
  • Compliance

© 2026 LaTeXCloud Studio. All rights reserved.

LaTeXCloud Studio Logo
  • Solutions
    • For Students
    • For Researchers
    • For Business
  • Features
  • Pricing
  • About
  • Resources
  • Solutions
  • Features
  • Pricing
  • About
  • Resources
  • enEnglish
  • deDeutsch
  • frFrançais
  • zh中文
LoginSign UpGet Started
LaTeXCloud Studio Logo

Pages

  • Home
  • Pricing
  • Solutions
  • About

Alternatives

  • OpenAI Prism
  • Overleaf
  • Papeeria

Legal

  • Privacy Policy
  • Cookie Policy
  • Compliance

© 2026 LaTeXCloud Studio. All rights reserved.

Legal

Compliance & Security

Last updated
February 8, 2026
Privacy Policy (iubenda)Cookie Policy (iubenda)
Contact

For security, compliance, or privacy inquiries, contact:

LaTeX@hirox-software-solutions.com

For responsible disclosure, include steps to reproduce and affected URLs.

On this page
  • GDPR and data protection
  • Infrastructure security
  • Application security
  • Assurance and consent
  • Security practices
  • Vulnerability management
  • Third-party services

At LaTeX Cloud Studio, we take security and privacy seriously. This page explains our approach and the controls we use. For the authoritative legal terms, please refer to our Privacy Policy and Cookie Policy.

Data Protection & GDPR Compliance

We aim to comply with applicable data protection laws, including the General Data Protection Regulation (GDPR), where they apply. In practice, that means we design the service and our processes to support:

  • Data minimization: Collecting and processing only what we need to operate and improve the service
  • Purpose limitation: Using data only for defined purposes
  • User rights requests: Supporting access, correction, deletion, and portability requests where applicable
  • Privacy by Design: Data protection is built into our systems from the ground up
  • Vendor management: Using vetted service providers and contractual safeguards where required

Infrastructure Security

Data Centers

  • EU data hosting for our web product infrastructure
  • Physical and operational security controls provided by our hosting providers

Network Security

  • Encryption in transit (TLS) for the website and API traffic
  • DDoS and abuse protections at the edge (provider-managed)
  • Ongoing security patching and dependency vulnerability monitoring

Application Security

Access Controls

  • Principle of least privilege for internal access
  • Security review for changes that affect data access paths

Data Encryption

  • Encryption in transit (TLS)
  • Encryption at rest and key management as supported by our infrastructure and storage providers

Compliance & Assurance

Depending on your organization, you may need assurance artefacts (for example, for procurement or institutional review). Please contact us and we can share what is currently available.

  • GDPR: We design for GDPR obligations (lawful bases, transparency, and user rights)
  • Cookies/consent: Optional analytics and marketing cookies are disabled until you opt in

Security Practices

Development Security

  • Secure development practices and code review
  • Regular code reviews and static analysis
  • Dependency scanning for vulnerabilities
  • Security training for all developers

Operational Security

  • Monitoring and alerting for service health
  • Incident response procedures
  • Employee background checks
  • Principle of least privilege

Vulnerability Management

We accept vulnerability reports and work to remediate issues in a timely manner.

  • Regular vulnerability scanning
  • Timely patching of identified vulnerabilities
  • Responsible disclosure via email

Third-Party Services

We use third-party service providers to operate the service (for example infrastructure, email delivery, and analytics). Details about analytics cookies and tracking are described in our Cookie Policy and Privacy Policy.

  • Vendors are selected based on security and reliability requirements
  • Contractual and technical safeguards are applied where required

Contact

Email us at LaTeX@hirox-software-solutions.com for security concerns, vulnerability reports, or compliance/privacy questions.

Legal

Compliance & Security

Last updated
February 8, 2026
Privacy Policy (iubenda)Cookie Policy (iubenda)
Contact

For security, compliance, or privacy inquiries, contact:

LaTeX@hirox-software-solutions.com

For responsible disclosure, include steps to reproduce and affected URLs.

On this page
  • GDPR and data protection
  • Infrastructure security
  • Application security
  • Assurance and consent
  • Security practices
  • Vulnerability management
  • Third-party services

At LaTeX Cloud Studio, we take security and privacy seriously. This page explains our approach and the controls we use. For the authoritative legal terms, please refer to our Privacy Policy and Cookie Policy.

Data Protection & GDPR Compliance

We aim to comply with applicable data protection laws, including the General Data Protection Regulation (GDPR), where they apply. In practice, that means we design the service and our processes to support:

  • Data minimization: Collecting and processing only what we need to operate and improve the service
  • Purpose limitation: Using data only for defined purposes
  • User rights requests: Supporting access, correction, deletion, and portability requests where applicable
  • Privacy by Design: Data protection is built into our systems from the ground up
  • Vendor management: Using vetted service providers and contractual safeguards where required

Infrastructure Security

Data Centers

  • EU data hosting for our web product infrastructure
  • Physical and operational security controls provided by our hosting providers

Network Security

  • Encryption in transit (TLS) for the website and API traffic
  • DDoS and abuse protections at the edge (provider-managed)
  • Ongoing security patching and dependency vulnerability monitoring

Application Security

Access Controls

  • Principle of least privilege for internal access
  • Security review for changes that affect data access paths

Data Encryption

  • Encryption in transit (TLS)
  • Encryption at rest and key management as supported by our infrastructure and storage providers

Compliance & Assurance

Depending on your organization, you may need assurance artefacts (for example, for procurement or institutional review). Please contact us and we can share what is currently available.

  • GDPR: We design for GDPR obligations (lawful bases, transparency, and user rights)
  • Cookies/consent: Optional analytics and marketing cookies are disabled until you opt in

Security Practices

Development Security

  • Secure development practices and code review
  • Regular code reviews and static analysis
  • Dependency scanning for vulnerabilities
  • Security training for all developers

Operational Security

  • Monitoring and alerting for service health
  • Incident response procedures
  • Employee background checks
  • Principle of least privilege

Vulnerability Management

We accept vulnerability reports and work to remediate issues in a timely manner.

  • Regular vulnerability scanning
  • Timely patching of identified vulnerabilities
  • Responsible disclosure via email

Third-Party Services

We use third-party service providers to operate the service (for example infrastructure, email delivery, and analytics). Details about analytics cookies and tracking are described in our Cookie Policy and Privacy Policy.

  • Vendors are selected based on security and reliability requirements
  • Contractual and technical safeguards are applied where required

Contact

Email us at LaTeX@hirox-software-solutions.com for security concerns, vulnerability reports, or compliance/privacy questions.