Pyract
Features Pricing FAQ
Portal Login Try the Demo
Privacy Policy Terms of Service Information Security Policy Security Procedures Access Control Data Retention

Security Procedures

Last updated: February 22, 2026

These Security Procedures describe how Break Space Inc. dba Pyract (“Pyract”) operationalizes the controls in the Information Security Policy.

1. Access

Production access is restricted and reviewed. Access is secured with strong authentication. Access is revoked promptly when no longer required.

2. Data handling

Sensitive data and tokens are stored securely. Client-side exposure is prevented. Demo and production environments are separated.

3. Logging

Security events and access are logged and reviewed.

4. Backups

Backups are maintained and periodically tested for recovery. Access to backups is restricted.

5. Incident response

Incidents are investigated, contained, and remediated.

6. Third-party services

Third-party services are used only as needed and expected to maintain security standards.

Pyract
Break Space Inc. dba Pyract