Open stage·left

Security

Last updated: February 17, 2026

Your data security is paramount. We use industry-standard encryption, secure infrastructure, and privacy-by-design principles. Your stage plots never leave your device.

HTTPS/TLS Encrypted Storage SOC 2 Infrastructure GDPR Compliant

1. How We Protect Your Data

1.1 Transport Security

All data transmitted between your browser and our servers is protected using:

1.2 Data Storage Security

Your application data (stage plots, input lists):

License and payment data:

1.3 Payment Security

We use Stripe for payment processing. Stripe is a PCI DSS Level 1 certified payment processor (the highest security certification in the payments industry).

2. Infrastructure Security

2.1 Hosting and Infrastructure Providers

Service Provider Security Certifications
Hosting Vercel SOC 2 Type II, GDPR compliant
Database Supabase (AWS) SOC 2 Type II, ISO 27001, GDPR compliant
Payment Stripe PCI DSS Level 1, SOC 1 & SOC 2
Error Monitoring Sentry SOC 2 Type II, GDPR compliant

2.2 Network Security

2.3 Access Control

3. Application Security

3.1 License Verification

License keys are generated using cryptographic hashing:

3.2 Content Security Policy (CSP)

We enforce strict CSP headers to prevent cross-site scripting (XSS) attacks:

3.3 Dependency Management

4. Privacy-by-Design

4.1 Local-First Architecture

Our applications are built with privacy as the foundation:

4.2 Minimal Data Collection

We collect the absolute minimum data necessary:

See our Privacy Policy for full details.

5. Your Responsibilities

Security is a shared responsibility. Here's how you can protect your data:

5.1 Protect Your License Key

5.2 Keep Backups

5.3 Use Secure Devices

5.4 Recognize Phishing

6. Vulnerability Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.

6.1 How to Report

Email: security@goforshow.io

Please include:

6.2 Our Commitment

6.3 What NOT to Do

When testing for vulnerabilities, please:

7. Data Breach Procedures

In the unlikely event of a data breach:

  1. Containment: Immediately isolate affected systems
  2. Assessment: Determine scope and severity within 24 hours
  3. Notification: Notify affected users within 72 hours (GDPR requirement)
  4. Remediation: Patch vulnerabilities and restore security
  5. Review: Conduct post-mortem and update security practices

We maintain cyber liability insurance to cover potential breach-related costs.

8. Compliance and Certifications

8.1 Regulations We Comply With

8.2 Third-Party Security

We rely on trusted providers with strong security track records:

9. Enterprise Security — back·line

back·line is purpose-built for enterprise production companies, rental houses, and touring operations that require the highest security standards for equipment inventory management.

9.1 Hardened Security Headers

back·line routes enforce additional security policies beyond the site-wide defaults:

9.2 Data Architecture

9.3 Access Controls

9.4 Audit & Compliance Readiness

9.5 Enterprise Contact

For enterprise security questionnaires, vendor assessments, or custom compliance requirements:

Email: security@goforshow.io
Response SLA: 48 hours for security inquiries, 24 hours for active incidents

10. General Security Practices

11. Questions or Concerns?

If you have security questions or concerns:

Security issues: security@goforshow.io
General inquiries: legal@goforshow.io
Support: support@goforshow.io

Operating as: go·for·show
Location: New York City, USA

Security is an ongoing process. We continuously monitor, update, and improve our security practices. This page is updated regularly to reflect our current security posture.

Last security audit: January 2026