Data Protection

Last updated: February 24, 2026

1. Security approach

Unmarked Goods applies layered technical and organizational controls to reduce risk to data, including access control, encryption in transit, and secure development practices.

2. Access management

Access is restricted to authorized personnel based on least-privilege principles and reviewed periodically.

3. Processor oversight

We use selected infrastructure and service providers that support strong security practices and contractual safeguards for data handling.

4. Incident response

We maintain a response process for potential incidents, including investigation, containment, and notification where required by applicable law.

5. Contact

Data protection requests can be submitted through the contact form on this website.