Security Statement: Map Ranks Pro, LLC
Last updated 03/19/2026
1. Security Overview
Map Ranks Pro, LLC (“Company”) is committed to protecting the integrity of the ChamberSearch™ Engine and the data of our Partner Organizations. We employ industry-standard technical, physical, and procedural controls to protect data against unauthorized access, alteration, or disclosure. Our strategy focuses on three pillars: Infrastructure Resilience, Data Encryption, and Access Control. Disclaimer: While we implement robust safeguards designed to protect your information, no security system is impenetrable. Due to the inherent nature of the Internet, we cannot guarantee that data, during transmission through the Internet or while stored on our systems, is absolutely safe from intrusion by others.
2. Infrastructure & Hosting
2.1 Tier-1 Cloud Infrastructure: The ChamberSearch™ Engine is hosted on infrastructure providers (including Supabase and Amazon Web Services) that maintain SOC 2 Type II compliant environments. These providers offer world-class physical security, biometric access controls, and redundant power/cooling.
2.2 Edge Protection: We utilize Cloudflare as our front-line defense. This deployment provides:
Web Application Firewall (WAF): To block SQL injection, cross-site scripting (XSS), and other common attacks.
DDoS Mitigation: To ensure the Engine remains online even during large-scale network attacks.
SSL/TLS Encryption: All traffic between the User and our servers is encrypted using modern TLS encryption standards.
3. Data Security
3.1 Encryption at Rest: All Member and Partner data stored in our databases is encrypted at rest using AES-256 industrial-strength encryption.
3.2 Encryption in Transit: Data moving between our servers, third-party APIs (e.g., Data Axle, Google), and the User’s browser is always encrypted.
3.3 Secure Authentication: Access to the ChamberSearch™ portal is protected by secure authentication protocols. We utilize salted hashing for all password storage, ensuring that raw passwords are never stored on our systems.
4. System Reliability & Backups
4.1 High Availability: Our database architecture is designed for high availability. In the event of a localized hardware failure, our infrastructure providers are designed to automatically failover to healthy instances to minimize downtime.
4.2 Automated Backups: We perform daily automated backups of all core application data. Backups are stored in geographically redundant locations to ensure recovery is possible even in the event of a regional disaster.
4.3 Monitoring: We employ continuous automated monitoring of our core application infrastructure. Alerts are generated immediately for any system anomalies or performance degradations.
5. Internal Controls & Response
5.1 Principle of Least Privilege: Access to production environments is strictly limited to authorized technical personnel and is granted only on a "need-to-know" basis.
5.2 Incident Response: We maintain internal procedures for responding to security incidents. In the event of a confirmed breach, we follow the notification protocols outlined in our Data Privacy & Compliance Statement.
5.3 Security Updates: We monitor for vulnerabilities in our software stack and apply security patches and dependency updates on a regular, rolling basis.
6. No Financial Data Storage
To maximize security and reduce risk for our Partners, Map Ranks Pro, LLC does not store raw credit card numbers or sensitive payment data on our servers. All financial transactions are handled via PCI-DSS Level 1 compliant payment processors.