Teamstand builds products that help its users organize their documents in email. We take security seriously, maintain strict internal policies that restrict unauthorized access to our users’ data, and work with our users to build trust and confidence in sharing data with us.

1. Privacy Practices

We do not sell your personal information to or share it with unaffiliated third parties for their own advertising or marketing purposes without your explicit consent. Check out our Privacy Policy for more information.

2. Cloud Infrastructure Security

Teamstand is hosted on a Virtual Private Cloud on Amazon Web Services, a secure and scalable platform that hosts thousands of other applications that you know or trust already. Learn more about AWS Cloud Security here.

3. Host Security

All our servers are launched inside the private cloud of Amazon Web Services, protected by network firewalls. We implement strict network access control lists that prevent intrusion into or attack on our servers. We implement strict network segmentation and isolation of environments and services that prevents unauthorized access to production servers. We use separate AWS SSO (Single Sign-On) accounts for production and non-production. Only production accounts have access to our production servers. We also implement MFA (Multi-Factor Authentication) and role-based authorization to restrict human access to production servers and production data.

4. Data Security

We employ strict separation of data across environments and have strict role-based access control to our production servers on authorized, need-to-use basis.

4.1. Encryption

Stored data is protected by encryption at rest, and in-flight transmitted data is protected by use of HTTPS / SSL Encryption. We utilize HTTPS / SSL encryption when sending or receiving data from the browser. We use key management services offered by Amazon AWS KMS to manage and rotate the encryption keys.

5. Incident and Change Management

We have deployed both automated and manual processes around Change Management that enable us to continuously release our software to our users. We have stable, automated processes around Incident Management and Reporting that quickly escalate to our Operations and Support teams any Incidents, including Systems downtime and Platform glitches, arising out of planned or unplanned changes.

6. Feedback and Incident Reporting

You could submit a bug report, feedback, any concerns, incidents you encounter to with detailed steps required to reproduce the issue.

6.1. Security Incidents

If you’ve discovered a security vulnerability, we want to know about it. Please send reports of vulnerabilities to We will make our best effort to investigate and fix the legitimate issues in a reasonable time frame.