Security & Privacy
How FairArena protects your data and ensures your privacy
Our Security Commitment
At FairArena, security isn't an afterthoughtβit's built into every layer of our platform. We use enterprise-grade security measures to protect your data and give you complete control over your privacy.
Enterprise Security
Military-grade encryption, DDoS protection, and 24/7 monitoring keep your data safe
You Control Privacy
Granular privacy controls let you decide exactly who sees your information
Security Features
Multi-Layer Protection
| Layer | Technology | Protection |
|---|---|---|
| π Authentication | Clerk (Industry leader) | Secure login, 2FA, session management |
| π‘οΈ DDoS Protection | Arcjet | Advanced attack prevention |
| π€ Bot Detection | Arcjet | Automated threat blocking |
| π Encryption | TLS/SSL, AES-256 | Data in transit & at rest |
| β‘ Rate Limiting | Smart throttling | Prevents abuse & attacks |
| ποΈ Monitoring | 24/7 surveillance | Real-time threat detection |
| π Audit Logs | Complete tracking | Accountability & compliance |
Data Encryption
In Transit:
All connections encrypted
- β TLS 1.3 (latest standard)
- β Perfect forward secrecy
- β Strong cipher suites
- β Certificate pinning
- β Automatic HTTPS redirect
Result: No one can intercept your data
Secure API communications
- β Token-based authentication
- β Request signing
- β Rate limiting
- β Input validation
- β Output sanitization
Result: APIs protected from abuse
Real-time security
- β WSS (WebSocket Secure)
- β Authentication required
- β Message encryption
- β Connection validation
Result: Secure real-time features
At Rest:
- π Database encryption (AES-256)
- π File storage encryption
- π Backup encryption
- π Key management (secure vault)
Account Security
Authentication
Powered by Clerk:
Multiple authentication methods:
Email & Password:
- Strong password requirements
- Password strength meter
- Breach detection
- Secure password hashing (bcrypt)
Social Login:
- Google OAuth
- GitHub OAuth
- Secure token exchange
Magic Links:
- Passwordless login option
- Time-limited tokens
- One-time use
Password requirements:
- Minimum 8 characters
- Mix recommended:
- Uppercase letters
- Lowercase letters
- Numbers
- Special characters
Protection features:
- β Breach database checking
- β Password history (no reuse)
- β Secure storage (hashed + salted)
- β Never sent in plain text
- β Can't be recovered (only reset)
Secure sessions:
- β Encrypted session tokens
- β Automatic expiration
- β Concurrent session limits
- β Device tracking
- β Remote logout capability
Session duration:
- Active: 7 days (default)
- Inactive: 30 minutes timeout
- Remember me: 30 days
- All configurable in settings
Two-Factor Authentication (2FA)
Add an extra security layer:
Enable 2FA
- Go to Account Settings
- Navigate to Security
- Click Enable Two-Factor Authentication
Choose Method
Available options:
| Method | Security Level | Convenience |
|---|---|---|
| Authenticator App | πππ High | βββ Good |
| SMS | ππ Medium | ββββ Easy |
| π Basic | βββββ Easiest |
Recommended: Authenticator app (Google Authenticator, Authy)
Set Up
For Authenticator App:
- Scan QR code with app
- Enter 6-digit code
- Verify it works
- Save backup codes
For SMS:
- Enter phone number
- Verify with code
- Enable 2FA
For Email:
- Confirm email address
- Test with code
- Activate
Save Backup Codes
β οΈ Critical: Save backup codes securely
- Use if you lose 2FA device
- Each code works once
- Store in password manager or safe place
- Print and keep in secure location
Test 2FA
- Log out
- Log back in
- Enter 2FA code
- Confirm it works
Important!
Keep backup codes safe! If you lose your 2FA device without backup codes, you'll need to contact support to recover your account.
Password Management
Reset Password:
Initiate Reset
Click "Forgot Password" on login page
Verify Identity
Enter your email address
Check Email
- Reset link sent instantly
- Valid for 1 hour
- Single use only
Create New Password
- Enter new password
- Confirm password
- Must be different from old
- Save changes
Confirmation
- Password updated successfully
- All sessions logged out
- Log in with new password
Password Best Practices:
Privacy Controls
Profile Privacy
Control who sees your information:
Maximum visibility
Who can see:
- β Anyone on the internet
- β Search engines
- β Non-logged in users
Best for:
- Job seekers
- Freelancers
- Public figures
- Open networking
Set: Profile β Privacy β Public
Platform-only visibility
Who can see:
- β Logged-in FairArena users only
- β Search engines
- β Non-members
Best for:
- Most users
- Balanced privacy
- Internal networking
Set: Profile β Privacy β Private
Maximum privacy + tracking
Who can see:
- β Only logged-in users
- β You can track who views
- β Anonymous viewing disabled
Best for:
- High privacy needs
- Track your audience
- Controlled access
Set: Profile β Privacy β Require Authentication
Data You Control
What you can make private:
| Data Type | Privacy Control | Location |
|---|---|---|
| Profile | Public/Private/Auth | Profile Settings |
| Show/Hide | Account Settings | |
| Phone | Show/Hide | Profile Settings |
| Resume | Show/Hide | Profile Settings |
| Work History | Show/Hide | Profile Settings |
| Education | Show/Hide | Profile Settings |
| Projects | Public/Internal/Private | Project Settings |
| Teams | Public/Internal/Private | Team Settings |
| Organizations | Public/Private | Organization Settings |
View Tracking
Control who can see you:
Enable View Tracking:
- Profile Settings β Privacy
- Toggle "Track Profile Views"
- Enable "Require Authentication"
- Save changes
What you'll see:
- Viewer's name
- Viewer's email
- View timestamp
- Total view count
- Recent viewers list
Disable Tracking:
- Toggle off anytime
- Previous data retained
- No new tracking
Data Privacy
What We Collect
Account Information:
- Email address
- Name (first, last)
- Password (hashed, never stored plain)
- Profile information you provide
Usage Information:
- Features you use
- Pages you visit
- Actions you take
- Performance data
- Error logs (for debugging)
Technical Information:
- IP address
- Browser type and version
- Device information
- Operating system
- Login timestamps
How We Use Data
Primary uses:
- Provide Service: Enable platform features
- Authentication: Verify your identity
- Communication: Send important notifications
- Improvement: Make platform better
- Security: Protect against threats
- Support: Help you when needed
- Legal: Comply with obligations
We DON'T:
- β Sell your data
- β Share without permission
- β Use for unrelated purposes
- β Track across other websites
- β Sell to advertisers
Data Rights
Your rights:
| Right | Description | How to Exercise |
|---|---|---|
| Access | See what data we have | Account β Privacy β Export Data |
| Correction | Fix incorrect data | Edit in Settings |
| Deletion | Delete your data | Account β Delete Account |
| Portability | Get your data | Account β Export |
| Object | Stop certain processing | Contact support |
| Restrict | Limit how we use data | Privacy Settings |
Data Retention
How long we keep data:
| Data Type | Retention Period | Reason |
|---|---|---|
| Active Account | While account exists | Service provision |
| Deleted Account | 30 days | Allow recovery |
| Backup Data | 90 days | Disaster recovery |
| Audit Logs | 1 year | Security & compliance |
| Transaction Records | 7 years | Legal requirement |
Platform Security
Infrastructure
Built on secure foundations:
- ποΈ Modern Stack: React 19, Express 5, PostgreSQL
- βοΈ Cloud Infrastructure: Reliable hosting
- π Regular Updates: Security patches applied quickly
- π¦ Dependency Management: Monitored for vulnerabilities
- π Database Security: Connection pooling, prepared statements
- π‘οΈ SQL Injection Prevention: Prisma ORM protection
DDoS & Attack Protection
Arcjet Protection:
Advanced attack prevention:
- β Traffic analysis
- β Automatic mitigation
- β Load balancing
- β IP filtering
- β Challenge responses
Result: Platform stays online during attacks
Stop malicious bots:
- β Behavioral analysis
- β Machine learning detection
- β CAPTCHA challenges
- β Fingerprint analysis
- β Real-time blocking
Result: Only real users access platform
Prevent abuse:
- β Request throttling
- β Per-IP limits
- β Per-user limits
- β Smart adjustments
- β Fair usage policies
Result: Resources available for everyone
Monitoring & Response
24/7 security monitoring:
- π Real-time threat detection
- π¨ Automated alerting
- π¨βπ» Security team response
- π Performance monitoring
- π Incident logging
- π Continuous improvement
Compliance & Standards
Security Standards
We follow:
| Standard | Description | Status |
|---|---|---|
| HTTPS Everywhere | All connections encrypted | β Compliant |
| OWASP Top 10 | Web security best practices | β Followed |
| GDPR | EU data protection | β Compliant |
| CCPA | California privacy law | β Compliant |
| SOC 2 | Security controls | π In progress |
Regular Audits
Security practices:
- π Weekly vulnerability scans
- π Quarterly security audits
- π Annual penetration testing
- π Continuous monitoring
- π Incident response plans
Reporting Security Issues
Responsible Disclosure
Found a security issue? We appreciate responsible disclosure:
Identify Issue
Document the security concern:
- What's the vulnerability?
- How did you find it?
- What's the impact?
- Steps to reproduce
Report Privately
Email: security@fairarena.com
Include:
- Detailed description
- Reproduction steps
- Screenshots/videos if applicable
- Your contact information
Wait for Response
- We respond within 24-48 hours
- Keep issue confidential
- Don't exploit vulnerability
- Don't share publicly yet
Coordinate Disclosure
- We'll work on a fix
- You'll be credited (if desired)
- Public disclosure coordinated
- Responsible disclosure appreciated
Rewards:
- Recognition in security hall of fame
- Potential bug bounty (case by case)
- Our sincere thanks!
Please don't: Exploit vulnerabilities, access others' data, disrupt service, or disclose publicly before we can fix. We appreciate responsible disclosure!
Best Practices for Users
Protect Your Account
Essential security habits:
- β Use strong, unique password
- β Enable 2FA
- β Keep software updated
- β Use secure networks
- β Log out on shared devices
- β Monitor account activity
- β Review privacy settings
- β Be cautious with emails
Recognize Phishing
Warning signs:
| Red Flag | Example |
|---|---|
| Suspicious sender | "fairarenas-support@gmail.com" |
| Urgent requests | "Account will be deleted in 24h!" |
| Generic greetings | "Dear user" instead of your name |
| Suspicious links | URL doesn't match fairarena.com |
| Request for password | We NEVER ask for your password |
| Poor grammar | Obvious spelling/grammar errors |
If suspicious:
- Don't click links
- Don't provide information
- Forward to security@fairarena.com
- Delete the email
FAQs
Next Steps
Security concerns? Email security@fairarena.com immediately.