Trust

Security & Compliance

How we protect your data and research

lock

TLS 1.3

Encrypted in Transit

cloud

Google Cloud

SOC 2 Compliant

fingerprint

Stripe Identity

ID Verification

shield

GDPR Ready

Data Rights

encrypted Data Protection

check_circle

All data is encrypted in transit using TLS 1.3 (HTTPS enforced on all endpoints)

check_circle

Hosted on Google Cloud Platform with SOC 2 Type II compliance, automatic encryption at rest, and managed security controls

check_circle

Database hosted on Cloud SQL with automated backups, point-in-time recovery, and private networking

check_circle

File uploads stored in Cloud Storage with signed URLs and access-controlled delivery

key Authentication

check_circle

Passwords hashed using bcrypt with unique per-user salts (plaintext passwords are never stored)

check_circle

Email verification required before account activation

check_circle

Identity verification via Stripe Identity (government ID + selfie) — we never store your identity documents

check_circle

Account lockout after 5 failed login attempts (15-minute cooldown)

check_circle

Session tokens with secure, HttpOnly, SameSite cookie attributes

admin_panel_settings Access Control

check_circle

Role-based access control: public visitors, registered users, NDA-verified researchers, and administrators

check_circle

Research track content gated behind NDA signature and identity verification

check_circle

Admin approval required for sensitive operations (reimbursements, trial verification, access exceptions)

check_circle

Email domain gating — corporate/institutional emails required, with manual review for exceptions

monitoring Monitoring & Audit

check_circle

Comprehensive audit logging of all user actions (logins, submissions, data access, admin operations)

check_circle

Rate limiting on authentication endpoints (login, registration, password reset) to prevent brute-force attacks

check_circle

CSRF protection via Origin/Referer header validation on all state-changing requests

check_circle

Input validation and length limits on all user-submitted data to prevent injection attacks

policy GDPR & Privacy Compliance

check_circle

Data export available upon request — receive all your data in machine-readable format

check_circle

Deletion requests honored within 30 days via the Request Deletion page

check_circle

Minimal data collection — we only collect what is necessary for Platform operation

check_circle

Cookie consent — analytics cookies loaded only after explicit opt-in

check_circle

Full Privacy Policy with PIPEDA, PIPA, and GDPR compliance details

bug_report Responsible Disclosure

We value the security research community. If you discover a vulnerability in the CAGE Research Platform, please report it responsibly.

Report vulnerabilities to:

security@cagechemicals.ca

Please include:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact assessment
  • Any suggested remediation

We will acknowledge receipt within 48 hours and aim to resolve confirmed vulnerabilities within 30 days. We will not take legal action against researchers who report in good faith and do not access or modify other users' data.