OnceAsked legal

Security Overview

We take security seriously at OnceAsked and work to exceed industry standards when protecting your organization.

Last updated: May 3, 2026

Security Program

OnceAsked applies layered controls across identity, infrastructure, storage, transport, monitoring, and incident response.

Security responsibilities are integrated into product design, deployment workflows, and operational processes.

Operational Controls

Controls include encryption in transit and at rest, access restrictions, logging, backups, and service hardening.

Security events are triaged using documented runbooks with escalation and stakeholder communication paths.

Security Contact

Questions related to security practices or disclosures can be directed to legal@onceasked.com.

For user-facing help and platform support, contact support@onceasked.com.

Identity, Access, and Secrets

Security controls include authenticated identity flows, scoped role permissions, key rotation practices, and centralized secret management.

Administrative access is restricted, logged, and reviewed under documented operational guardrails.

Vulnerability and Incident Management

Reported vulnerabilities are triaged by severity, tracked through remediation workflows, and validated before closure.

Incident response includes containment, root-cause analysis, communication, and follow-up hardening actions.

Company and Contact

OnceAsked, Inc. is a Delaware C Corporation headquartered in New York City, NY 10001.

For legal matters, contact legal@onceasked.com. For all other matters, contact support@onceasked.com.

Data Commitment

OnceAsked does not sell personal information under any circumstances.

We only share information with trusted partners when expressly permitted by contract, administrator configuration, or user instruction.