Security Policy

Security Policy Last updated: March 4, 2026 Overview Klyte is designed with multiple layers of security to protect user data and authorized Amazon seller account information. Data Encryption All communication between users and the platform is encrypted in transit using modern TLS protocols. Data handled by the platform is protected using secure infrastructure practices and controlled access policies. Access Controls Access to systems and operational data is restricted to authorized personnel. Security controls include: • Role-based access control • Secure authentication practices • Administrative access monitoring and logging Infrastructure Security Klyte operates on secure cloud infrastructure that includes: • Network-level protections • System monitoring and logging • Automated system updates and security patching Amazon Data Protection Klyte accesses Amazon seller data only through Amazon’s official Selling Partner API and only after explicit authorization from the seller. The platform is designed to minimize exposure of Amazon customer personal information and processes such data only when necessary to provide platform functionality. Amazon account access can be revoked by the seller at any time through Amazon Seller Central. Security Monitoring The platform includes monitoring and logging mechanisms designed to detect abnormal activity or unauthorized access attempts. Incident Response If a security incident occurs, Klyte will: 1. Investigate the issue immediately 2. Contain and resolve the vulnerability 3. Notify affected users when appropriate 4. Implement safeguards to prevent recurrence Responsible Disclosure Security researchers who identify potential vulnerabilities are encouraged to report them responsibly. security@klyte.ai

← Back to Home