Security
Your data is central to how SecondTouch works. We treat that responsibility seriously and design the product to be secure, predictable, and transparent.
SecondTouch exists to help you manage relationships—not to collect, monetize, or expose your data. Every design decision around data handling is guided by that principle.
How We Handle Your Data
SecondTouch is intentionally designed for lightweight relationship context, not as a system of record for sensitive or regulated data.
You should use the system to capture:
- Interaction summaries (what happened, what matters next)
- Relationship context (objectives, open threads)
- High-level notes that support follow-up and continuity
You should avoid storing:
- Legal, financial, or regulated data
- Personally sensitive information (e.g., SSNs, health data)
- Confidential documents or proprietary material
This approach reduces risk while ensuring the system can still generate useful insights.
We minimize:
- The amount of data required to use the product
- The sensitivity of the data stored
- The surface area for potential exposure
Data Protection
We follow standard, modern best practices to protect your data at all stages.
This includes:
Data Storage
- Data is stored in secure, managed infrastructure
- Systems are configured to limit unauthorized access
- Access to production data is restricted and controlled
Data Transmission
- All data is encrypted in transit using HTTPS/TLS
- Communication between services is secured
Access Controls
- Internal access to data is limited to what is necessary to operate the product
- Access is monitored and controlled through authentication and permissions
We do not expose your data publicly or to other users. Your data is isolated within your account context.
Authentication and Account Security
We implement secure authentication practices to protect user accounts.
This includes:
- Secure login flows
- Protection against unauthorized access attempts
- Session management to prevent misuse
User responsibilities:
- Use strong, unique passwords
- Do not share login credentials
- Log out of shared or public devices
If you suspect unauthorized access, you should contact support immediately.
Infrastructure and Reliability
SecondTouch is built on established cloud infrastructure providers with strong security and reliability track records.
This allows us to:
- Maintain high availability and uptime
- Ensure data redundancy and durability
- Apply industry-standard infrastructure security practices
We rely on proven infrastructure rather than custom-built systems to reduce risk and increase reliability.
Data Usage
We are explicit about how your data is used:
- Your data is used only to power your experience inside SecondTouch
- It is used to generate insights, signals, and your daily brief
- It is not used for advertising
- It is not sold or monetized
We do not:
- Sell your data
- Share your data with advertisers
- Use your data to train external systems without your knowledge
Limited third-party access exists only where required to operate the product (e.g., infrastructure and billing providers).
Billing and Payment Security
All billing and payment processing is handled by Stripe, a secure third-party provider.
This means:
- Payment details are never stored in SecondTouch systems
- Sensitive financial data is handled through Stripe’s secure infrastructure
- Billing actions (updating payment methods, viewing invoices) occur in a protected external portal
Stripe is responsible for:
- Payment processing
- Card security
- Billing infrastructure
SecondTouch is responsible for:
- Subscription state within the product
- Access control based on billing status
Data Minimization and Design Philosophy
Security is not only about protection—it is also about reducing risk through design.
SecondTouch is built to:
- Avoid storing unnecessary data
- Encourage lightweight, high-signal inputs
- Limit reliance on sensitive information
This reduces:
- The impact of potential breaches
- The complexity of securing large volumes of sensitive data
- The likelihood of misuse
What We Do Not Do
To remove ambiguity:
- We do not sell your data
- We do not use your data for advertising
- We do not expose your data to other users or organizations
- We do not require unnecessary personal information to use the product
- We do not position SecondTouch as a system for storing sensitive or regulated data
Questions or Concerns
If you have questions about security or how your data is handled, contact us:
support@streamlinedu.com
When reaching out, include:
- Your question or concern
- Any relevant context or screenshots
We aim to be clear, direct, and responsive.
Built for Trust
SecondTouch is designed to support your most important relationships. That requires trust in how your data is handled.
We focus on:
- Minimizing unnecessary data collection
- Using secure, proven infrastructure
- Being explicit about how data is used
- Giving you control over what you choose to log
Your data should remain yours—used only to help you maintain and strengthen your relationships.