Privacy Policy
Terms of Service
Information Security Policy
Security Procedures
Access Control
Data Retention
Security Procedures
Last updated: February 22, 2026
These Security Procedures describe how Break Space Inc. dba Pyract (“Pyract”) operationalizes the controls in the Information Security Policy.
1. Access
Production access is restricted and reviewed. Access is secured with strong authentication. Access is revoked promptly when no longer required.
2. Data handling
Sensitive data and tokens are stored securely. Client-side exposure is prevented. Demo and production environments are separated.
3. Logging
Security events and access are logged and reviewed.
4. Backups
Backups are maintained and periodically tested for recovery. Access to backups is restricted.
5. Incident response
Incidents are investigated, contained, and remediated.
6. Third-party services
Third-party services are used only as needed and expected to maintain security standards.