1. Overview
At Pryde Social, we take your security seriously. This page outlines the technical and organizational measures we implement to protect your data and ensure a safe platform for the LGBTQ+ community.
Our commitment: We use industry-standard security practices to safeguard your personal information, prevent unauthorized access, and maintain the integrity of our platform.
2. Data Encryption
Encryption in Transit
- HTTPS/TLS: All data transmitted between your device and our servers is encrypted using TLS 1.2 or higher
- Secure WebSockets: Real-time features (messaging, notifications) use encrypted WebSocket connections (WSS)
- API Security: All API endpoints require secure HTTPS connections
Encryption at Rest
- Password Hashing: Passwords are hashed using bcrypt with salt rounds (never stored in plain text)
- Database Encryption: Sensitive data is encrypted at the database level
- File Storage: Uploaded media files are stored securely with access controls
3. Authentication & Access Control
Account Security
- Secure Login: JWT (JSON Web Token) based authentication with expiration
- Session Management: Automatic session timeout after inactivity
- Password Requirements: Minimum 8 characters with complexity requirements
- Account Recovery: Secure password reset via email verification
Access Controls
- Role-Based Access: Users can only access their own data and public content
- Privacy Controls: Granular privacy settings for posts, profile, and visibility
- Blocking & Reporting: Tools to block users and report inappropriate content
4. Infrastructure Security
Hosting & Servers
- Cloud Infrastructure: Hosted on secure, reputable cloud providers (Render)
- Server Hardening: Regular security updates and patches
- Firewall Protection: Network-level firewalls to prevent unauthorized access
- DDoS Protection: Cloudflare protection against distributed denial-of-service attacks
Database Security
- MongoDB Security: Authentication required, IP whitelisting, encrypted connections
- Regular Backups: Automated daily backups with encryption
- Access Logging: All database access is logged and monitored
5. Privacy & Data Protection
Data Minimization
- We only collect data necessary for platform functionality
- Optional fields remain optional (gender, orientation, location, etc.)
- You control what information is visible on your profile
Private Messages
- Privacy: Private messages are not monitored or read by staff
- Access: Messages are only accessed when reported for safety/legal reasons
- Retention: Messages are stored securely and can be deleted by users
See our Privacy Policy and Terms of Service for more details.
6. Threat Detection & Prevention
Automated Security
- Rate Limiting: Protection against brute force attacks and spam
- Input Validation: All user input is sanitized to prevent injection attacks
- XSS Protection: Cross-site scripting prevention measures
- CSRF Protection: Cross-site request forgery tokens on all forms
Content Moderation
- Reporting System: Users can report inappropriate content, harassment, or violations
- Review Process: Reported content is reviewed by moderators
- Account Actions: Warnings, suspensions, or bans for policy violations
7. Security Monitoring & Incident Response
Continuous Monitoring
- Server Monitoring: 24/7 automated monitoring of server health and security
- Error Tracking: Automated error logging and alerting
- Access Logs: All authentication attempts and admin actions are logged
- Anomaly Detection: Unusual activity patterns trigger alerts
Incident Response
- Response Team: Dedicated team to handle security incidents
- Breach Notification: Users will be notified within 72 hours of any data breach
- Investigation: All security incidents are investigated and documented
- Remediation: Immediate action to patch vulnerabilities and prevent recurrence
8. User Account Security
Best Practices for Users
- Strong Passwords: Use unique, complex passwords (minimum 8 characters)
- Don't Share Credentials: Never share your password with anyone
- Logout on Shared Devices: Always log out when using public/shared computers
- Verify Links: Be cautious of phishing attempts - we'll never ask for your password via email
- Report Suspicious Activity: Contact us immediately if you notice unauthorized access
Account Recovery
- Email Verification: Password resets require email verification
- Secure Reset Links: Reset links expire after 1 hour
- Account Support: Contact us at support@prydeapp.com for account issues
9. Third-Party Security
Service Providers
We carefully vet all third-party services we use:
- Hosting: Render (secure cloud infrastructure)
- CDN: Cloudflare (DDoS protection, SSL/TLS)
- Email: Secure email service providers for notifications
- Media Storage: Secure cloud storage with encryption
No Data Selling
- We never sell your data to third parties
- We never share your data with advertisers
- Third-party services are used only for platform functionality
10. LGBTQ+ Safety Considerations
Privacy for High-Risk Users
We understand that LGBTQ+ individuals in certain regions face unique safety risks. Our Safety & Moderation page provides:
- Location Privacy: Option to hide or disable location sharing
- Online Status: Option to hide online status and last seen
- Profile Visibility: Control who can see your profile and posts
- Anonymous Browsing: Browse without revealing your identity
11. Vulnerability Disclosure
Responsible Disclosure
If you discover a security vulnerability, please report it responsibly:
- Email: support@prydeapp.com with subject "Security Vulnerability"
- Include: Detailed description, steps to reproduce, and potential impact
- Do Not: Publicly disclose the vulnerability before we've had time to fix it
- Response Time: We aim to respond within 48 hours
Bug Bounty
While we don't currently offer a formal bug bounty program, we deeply appreciate responsible disclosure and will acknowledge security researchers who help us improve platform security.
12. Contact & Support
Security Concerns
If you have security concerns or questions:
📧 Email: support@prydeapp.com
Subject Line: "Security Inquiry" or "Security Vulnerability"
Related Resources
- Privacy Policy - How we handle your data
- Terms of Service - Platform rules and responsibilities
- Safety & Moderation - LGBTQ+ safety resources and tips
- Community Guidelines - Expected behavior on the platform
Last Updated: November 27, 2025