Security

Your data is central to how SecondTouch works. We treat that responsibility seriously and design the product to be secure, predictable, and transparent.

SecondTouch exists to help you manage relationships—not to collect, monetize, or expose your data. Every design decision around data handling is guided by that principle.

How We Handle Your Data

SecondTouch is intentionally designed for lightweight relationship context, not as a system of record for sensitive or regulated data.

You should use the system to capture:

  • Interaction summaries (what happened, what matters next)
  • Relationship context (objectives, open threads)
  • High-level notes that support follow-up and continuity

You should avoid storing:

  • Legal, financial, or regulated data
  • Personally sensitive information (e.g., SSNs, health data)
  • Confidential documents or proprietary material

This approach reduces risk while ensuring the system can still generate useful insights.

We minimize:

  • The amount of data required to use the product
  • The sensitivity of the data stored
  • The surface area for potential exposure

Data Protection

We follow standard, modern best practices to protect your data at all stages.

This includes:

Data Storage

  • Data is stored in secure, managed infrastructure
  • Systems are configured to limit unauthorized access
  • Access to production data is restricted and controlled

Data Transmission

  • All data is encrypted in transit using HTTPS/TLS
  • Communication between services is secured

Access Controls

  • Internal access to data is limited to what is necessary to operate the product
  • Access is monitored and controlled through authentication and permissions

We do not expose your data publicly or to other users. Your data is isolated within your account context.

Authentication and Account Security

We implement secure authentication practices to protect user accounts.

This includes:

  • Secure login flows
  • Protection against unauthorized access attempts
  • Session management to prevent misuse

User responsibilities:

  • Use strong, unique passwords
  • Do not share login credentials
  • Log out of shared or public devices

If you suspect unauthorized access, you should contact support immediately.

Infrastructure and Reliability

SecondTouch is built on established cloud infrastructure providers with strong security and reliability track records.

This allows us to:

  • Maintain high availability and uptime
  • Ensure data redundancy and durability
  • Apply industry-standard infrastructure security practices

We rely on proven infrastructure rather than custom-built systems to reduce risk and increase reliability.

Data Usage

We are explicit about how your data is used:

  • Your data is used only to power your experience inside SecondTouch
  • It is used to generate insights, signals, and your daily brief
  • It is not used for advertising
  • It is not sold or monetized

We do not:

  • Sell your data
  • Share your data with advertisers
  • Use your data to train external systems without your knowledge

Limited third-party access exists only where required to operate the product (e.g., infrastructure and billing providers).

Billing and Payment Security

All billing and payment processing is handled by Stripe, a secure third-party provider.

This means:

  • Payment details are never stored in SecondTouch systems
  • Sensitive financial data is handled through Stripe’s secure infrastructure
  • Billing actions (updating payment methods, viewing invoices) occur in a protected external portal

Stripe is responsible for:

  • Payment processing
  • Card security
  • Billing infrastructure

SecondTouch is responsible for:

  • Subscription state within the product
  • Access control based on billing status

Data Minimization and Design Philosophy

Security is not only about protection—it is also about reducing risk through design.

SecondTouch is built to:

  • Avoid storing unnecessary data
  • Encourage lightweight, high-signal inputs
  • Limit reliance on sensitive information

This reduces:

  • The impact of potential breaches
  • The complexity of securing large volumes of sensitive data
  • The likelihood of misuse

What We Do Not Do

To remove ambiguity:

  • We do not sell your data
  • We do not use your data for advertising
  • We do not expose your data to other users or organizations
  • We do not require unnecessary personal information to use the product
  • We do not position SecondTouch as a system for storing sensitive or regulated data

Questions or Concerns

If you have questions about security or how your data is handled, contact us:

support@streamlinedu.com

When reaching out, include:

  • Your question or concern
  • Any relevant context or screenshots

We aim to be clear, direct, and responsive.

Built for Trust

SecondTouch is designed to support your most important relationships. That requires trust in how your data is handled.

We focus on:

  • Minimizing unnecessary data collection
  • Using secure, proven infrastructure
  • Being explicit about how data is used
  • Giving you control over what you choose to log

Your data should remain yours—used only to help you maintain and strengthen your relationships.