Security Policy
Security Policy
Last updated: March 4, 2026
Overview
Klyte is designed with multiple layers of security to protect user data and authorized Amazon seller account information.
Data Encryption
All communication between users and the platform is encrypted in transit using modern TLS protocols.
Data handled by the platform is protected using secure infrastructure practices and controlled access policies.
Access Controls
Access to systems and operational data is restricted to authorized personnel.
Security controls include:
• Role-based access control
• Secure authentication practices
• Administrative access monitoring and logging
Infrastructure Security
Klyte operates on secure cloud infrastructure that includes:
• Network-level protections
• System monitoring and logging
• Automated system updates and security patching
Amazon Data Protection
Klyte accesses Amazon seller data only through Amazon’s official Selling Partner API and only after explicit authorization from the seller.
The platform is designed to minimize exposure of Amazon customer personal information and processes such data only when necessary to provide platform functionality.
Amazon account access can be revoked by the seller at any time through Amazon Seller Central.
Security Monitoring
The platform includes monitoring and logging mechanisms designed to detect abnormal activity or unauthorized access attempts.
Incident Response
If a security incident occurs, Klyte will:
1. Investigate the issue immediately
2. Contain and resolve the vulnerability
3. Notify affected users when appropriate
4. Implement safeguards to prevent recurrence
Responsible Disclosure
Security researchers who identify potential vulnerabilities are encouraged to report them responsibly.
security@klyte.ai