Security Policy

Effective Date: February 14, 2026 | Version 1.0

Commitment: Aether Intelligence is committed to protecting the confidentiality, integrity, and availability of user data. This policy outlines our security practices and controls.

1. Governance and Risk Management

1.1 Security Responsibility

The Chief Executive Officer (CEO) serves as the designated security officer responsible for:

Security Contact: Rahul Talwar, CEO — rahul@aetherlabs.live

1.2 Risk Assessment

Aether conducts ongoing risk assessments to identify, evaluate, and mitigate information security risks. Key risk areas include:

2. Infrastructure Security

2.1 Cloud Infrastructure

Aether operates on enterprise-grade cloud platforms with built-in security controls:

ProviderPurposeUser AccessSecurity Features
Google Cloud Platform (GCP)User-facing application, API services, user data storageYes — all user interactionsCloud Run (serverless), IAM, Firestore encryption, Cloud Load Balancing
Amazon Web Services (AWS)Internal research systems, market analysis (no user data)No — internal onlyVPC isolation, security groups, encryption at rest
CloudflareDNS, CDN, DDoS protectionProxy layerWAF, SSL/TLS termination, threat mitigation

Data Isolation: All user data, including financial account information from Plaid integrations, is processed and stored exclusively on Google Cloud Platform. Internal research systems on AWS do not have access to user personal or financial data.

2.2 Network Security

3. Access Control

3.1 Administrative Access

3.2 User Authentication

3.3 Third-Party Access

Aether integrates with third-party services for specific functions:

ServicePurposeData Shared
PlaidAccount aggregationRead-only access to holdings and balances
AlpacaBrokerage integrationTrade execution (user-initiated only)
AnthropicAI servicesAnonymized conversation data

4. Data Protection

4.1 Data Classification

ClassificationDescriptionHandling
SensitiveFinancial account data, holdings, balancesEncrypted, access-controlled, logged
PersonalName, email, preferencesEncrypted at rest, limited access
PublicMarket data, educational contentNo special handling required

4.2 Data Retention

4.3 Data Deletion

Users may request deletion of their data by contacting rahul@aetherlabs.live. Upon verified request:

5. Vulnerability Management

5.1 Patching and Updates

5.2 Security Monitoring

6. Incident Response

6.1 Incident Classification

SeverityDescriptionResponse Time
CriticalData breach, unauthorized access to user dataImmediate (within 1 hour)
HighService outage, potential vulnerability exploitWithin 4 hours
MediumSuspicious activity, minor service degradationWithin 24 hours
LowPolicy violations, non-urgent security issuesWithin 7 days

6.2 Incident Response Process

  1. Detection: Identify and confirm the incident
  2. Containment: Isolate affected systems to prevent spread
  3. Eradication: Remove the threat and patch vulnerabilities
  4. Recovery: Restore systems to normal operation
  5. Post-Incident Review: Document lessons learned and improve controls

6.3 Breach Notification

In the event of a data breach affecting user information:

7. Business Continuity

7.1 Backup and Recovery

8. Compliance

8.1 Regulatory Framework

Aether operates as an educational research platform and maintains compliance with:

Important: Aether Intelligence is NOT a registered investment advisor (RIA), broker-dealer, or financial institution. We provide educational tools and research; all investment decisions are made by users.

9. Policy Review

This Security Policy is reviewed and updated:

10. Contact

For security concerns, vulnerability reports, or questions about this policy:

Email: rahul@aetherlabs.live
Subject Line: [SECURITY] Your concern