Information Security & Data Protection Policy

LevelUp Platform
Document Version: 1.0 (Public)
Effective Date: January 2026
Last Reviewed: January 2026
Document Classification: Public - Customer-Facing

1. Purpose & Scope

1.1 Purpose

This Information Security & Data Protection Policy establishes LevelUp Platform's commitment to identifying, mitigating, and monitoring information security risks relevant to our business operations, technology infrastructure, and customer data processing activities.

1.2 Scope

This policy applies to:

2. Security Risk Management

SOC 2: CC6.1, CC6.2 | ISO 27001: A.5.1.1

2.1 Policy Statement

LevelUp Platform maintains operationalized security policies and procedures to identify, assess, mitigate, and continuously monitor information security risks relevant to our business operations, technology infrastructure, and customer data processing activities.

2.2 Risk Management Approach

We employ a comprehensive risk management program that includes:

2.3 Risk Mitigation Strategies

3. Access Control & Authentication

SOC 2: CC6.2, CC6.3 | ISO 27001: A.9.2.1, A.9.4.2 | Zero Trust Architecture

3.1 Policy Statement

LevelUp Platform implements Role-Based Access Control (RBAC) with OAuth token-based authentication and Zero Trust access architecture. Access to information systems, applications, and data is granted based on business need, role responsibilities, and the principle of least privilege. All access requests, grants, modifications, and revocations are logged and periodically reviewed.

3.2 Authentication Architecture

3.3 Zero Trust Access Architecture

We implement Zero Trust principles:

4. Multi-Factor Authentication

SOC 2: CC6.2 | ISO 27001: A.9.4.2

4.1 Policy Statement

Multi-Factor Authentication (MFA) is required for all Silver and Gold service tier users accessing the LevelUp Platform. MFA requires two or more independent authentication factors: something the user knows (password) and something the user possesses (authenticator app code, SMS code, or hardware token). Standard tier users are strongly encouraged but not required to enable MFA.

4.2 MFA Requirements by Service Tier

Service Tier MFA Requirement Enforcement
Silver MFA Required Enforced at login and account setup
Gold MFA Required Enforced at login and account setup
Standard MFA Optional (Recommended) User can enable in account settings

4.3 Supported MFA Methods

5. Data Encryption in Transit

SOC 2: CC6.7 | ISO 27001: A.10.1.1 | PCI DSS 4.1 | TLS 1.2+

5.1 Policy Statement

All data transmitted between clients and LevelUp Platform servers must be encrypted using Transport Layer Security (TLS) version 1.2 or higher. TLS 1.0 and TLS 1.1 are explicitly prohibited. All API endpoints, web applications, and mobile application communications use TLS encryption. Unencrypted HTTP connections are automatically redirected to HTTPS.

5.2 TLS Configuration Standards

5.3 Encryption Coverage

6. Data Encryption at Rest

SOC 2: CC6.7 | ISO 27001: A.10.1.2 | PCI DSS 3.4

6.1 Policy Statement

All Plaid-sourced financial data stored by LevelUp Platform for Silver and Gold service tier customers is encrypted at rest using industry-standard encryption algorithms (AES-256 or equivalent). Database-level encryption, application-level encryption, or cloud provider encryption services are used to meet minimum encryption strength requirements. Standard tier customers' financial data (if any) is encrypted using database-level encryption.

6.2 Encryption Requirements by Data Type

Data Type Service Tier Encryption Requirement
Plaid Financial Data Silver, Gold AES-256 encryption at rest
Plaid Financial Data Standard Database-level encryption
Customer PII All Tiers Encryption at rest
Authentication Tokens All Tiers Encryption at rest
Payment Credentials All Tiers Encryption at rest

6.3 Key Management

7. Vulnerability Management

SOC 2: CC6.2 | ISO 27001: A.12.6.1

7.1 Policy Statement

LevelUp Platform performs routine vulnerability scans against employee and contractor machines (e.g., laptops, workstations) and production assets (e.g., server instances, containers, network infrastructure) to detect and patch vulnerabilities. Critical and high-severity vulnerabilities are patched within defined timeframes based on risk assessment. Vulnerability scanning results are documented, tracked, and remediated according to established procedures.

7.2 Vulnerability Scanning Program

We maintain a comprehensive vulnerability management program that includes:

7.3 Remediation Process

Vulnerabilities are prioritized and remediated based on severity:

7.4 Patch Management

9. Data Deletion & Retention

GDPR: Art. 17 (Right to Erasure) | CCPA/CPRA: § 1798.105

9.1 Policy Statement

LevelUp Platform implements data deletion procedures to honor user requests for data erasure ("right to be forgotten") and to enforce data retention limits. Users may request deletion of their personal data at any time, subject to legal retention requirements (e.g., financial records, tax obligations, legal disputes). Deleted data is permanently removed from production systems and backups according to defined procedures, unless legal holds or retention obligations require preservation.

9.2 Data Deletion Rights

Users have the right to:

9.3 Data Retention

Data is retained in accordance with legal requirements and business needs:

9.4 Deletion Process

10. Incident Response

SOC 2: CC7.2 | ISO 27001: A.16.1

10.1 Policy Statement

LevelUp Platform maintains incident response procedures to detect, respond to, and recover from security incidents. We are committed to notifying affected users and relevant authorities of security incidents involving personal data in accordance with applicable legal requirements.

10.2 Incident Detection

10.3 Incident Response

10.4 Incident Notification

11. Compliance Frameworks

11.1 SOC 2 Type I & II

LevelUp Platform is committed to maintaining SOC 2 compliance. Our security controls align with relevant Trust Service Criteria including:

11.2 ISO 27001

Our security controls align with ISO 27001 requirements including:

11.3 PCI DSS

LevelUp uses third-party payment processors (PayPal, Finix, Braintree) for payment processing. PCI DSS scope is limited to handling payment tokens, not full cardholder data.

11.4 Privacy Frameworks

12. Notice Regarding Apple

iOS Application Terms

12.1 Policy Statement

This Section only applies to the extent you are using our mobile application on an iOS device. You acknowledge that this Agreement is between you and Cog-mission only, not with Apple Inc. ("Apple"), and Apple is not responsible for the Service or the content thereof.

12.2 Apple's Limited Role

Apple has no obligation to furnish any maintenance and support services with respect to the Service. If the Service fails to conform to any applicable warranty, you may notify Apple and Apple will refund any applicable purchase price for the mobile application to you; and, to the maximum extent permitted by applicable law, Apple has no other warranty obligation with respect to the Service.

12.3 Apple's Limited Responsibility

Apple is not responsible for addressing any claims by you or any third party relating to the Service or your possession and/or use of the Service, including:

12.4 Intellectual Property Claims

Apple is not responsible for the investigation, defense, settlement and discharge of any third party claim that the Service and/or your possession and use of the Service infringe a third party's intellectual property rights.

12.5 Third Party Beneficiary

You agree to comply with any applicable third party terms when using the Service. Apple and Apple's subsidiaries are third party beneficiaries of this Agreement, and upon your acceptance of this Agreement, Apple will have the right (and will be deemed to have accepted the right) to enforce this Agreement against you as a third party beneficiary of this Agreement.

12.6 Representations and Warranties

You hereby represent and warrant that: