Trust

Security

Last updated: April 26, 2026

Tracks trust GRID with a lot of sensitive information — phone numbers, emergency contacts, photos, signatures, payment receipts. Here’s how we protect it.


Authentication

Encryption

Row-level security

Every table in our database is locked down with row-level security policies, enforced by Postgres itself — not by application code that could be bypassed. The rule we follow:

Audit logging

Every staff action that mutates a record — approving a tech card, voiding an entry, refunding, editing pricing — writes a row to our audit log with the user, timestamp, and what changed. Track admins can review this log for their own track.

Account deletion

You can delete your account from Settings → Delete Account. When you do:

Payments

When payments go live they’ll be processed by Stripe. Card numbers, CVCs, and expiration dates never touch our servers — they go straight from the user’s device to Stripe. We only ever see a charge ID and the last 4 digits.

Vendors we trust

We rely on a small number of well-known providers for the parts of the stack we don’t want to build ourselves:

What we don’t do

Reporting a vulnerability

If you find a security issue, please tell us before disclosing publicly. We’ll respond within one business day and work with you on a coordinated fix.

Email: gridbyzn@gmail.com with subject line SECURITY.

Please include:

We don’t currently run a paid bug bounty, but we’ll publicly thank researchers who report responsibly.

Breach notification

If we discover a data breach affecting you, we’ll notify you within a reasonable time and as required by applicable law (GDPR, CCPA, PIPEDA, state breach laws, etc.).


For the legal underpinnings of all of this, see our Privacy Policy and Terms of Service.