LightLink

Security Practices

Last updated May 9, 2026

We treat workforce-tracking data the same way we'd treat our own payroll — minimal, isolated, and audited. This page documents what we do, in concrete terms.

1. Network & transport

2. Tenant isolation

3. Authentication & access control

4. Audit logging

5. Screenshot privacy

6. Backup & recovery

7. Vendor management

8. Code & deploy hygiene

9. Incident response

10. What we're working on next

Documented in our public repository as a roadmap. Highlights: AES-256 screenshot encryption at rest (in progress), real-time live-screen via WebSocket, ISO 27001 audit prep, optional self-hosted deployment for Enterprise.