This Written Information Security Program ("WISP") describes the administrative, technical, and physical safeguards WhiteFang.ai ("WhiteFang," "Company," "we") maintains to protect personal information collected through the WhiteFang platform. It applies to all personal information of Massachusetts residents and is maintained as required by Massachusetts data security regulations (201 CMR 17.00).
The platform serves two types of users: consumers who earn and redeem digital credits at local businesses, and merchants who issue those credits. Personal information from both user types falls within the scope of this program.
This program covers the following categories of personal information:
| Category | Data Elements |
|---|---|
| Consumer account data | Name, email address, phone number (optional), birthday month/day (optional) |
| Consumer activity data | Credits earned and redeemed, transaction timestamps, merchant interactions, behavioral segment classification |
| Merchant account data | Business owner name, email address, business name and address, social/web links |
| Merchant credentials | POS API access tokens (Shopify, Toast) — stored encrypted, never in plaintext |
| Authentication data | Password hashes managed by Supabase Auth — WhiteFang never has access to plaintext passwords |
The founder and Chief Executive Officer of WhiteFang is responsible for implementing, maintaining, and enforcing this WISP. As the company grows, a designated team member may be assigned day-to-day security program responsibility. That person's name and contact information is available to affected individuals upon written request to support@whitefang.ai.
We identify and assess the following risks to personal information on an ongoing basis. Our technical safeguards (Section 5) are designed to address each.
The following safeguards are implemented at the platform level and are verifiable in the platform's architecture.
All communication between user devices and the WhiteFang platform is encrypted using TLS (HTTPS). HTTPS is enforced by Netlify's hosting infrastructure; plain HTTP requests are redirected automatically.
All inbound webhooks from Shopify and Toast are verified using HMAC-SHA256 signatures before any data is read or any action is taken. Requests with absent or invalid signatures are rejected with a 401 response and no data is processed.
Public API endpoints (geocoding, image processing) enforce server-side rate limiting per IP address to prevent enumeration and abuse.
An automated edge function monitors credit transaction patterns across the platform for anomalous behavior that may indicate fraud or unauthorized account use. Suspicious patterns trigger internal alerts for review.
WhiteFang relies on the following sub-processors to operate the platform. Each was selected in part because of its security posture and relevant certifications. We share personal information with each provider only to the extent necessary for the platform to function.
| Provider | Role | Security Certifications |
|---|---|---|
| Supabase | Database, authentication, edge functions | SOC 2 Type II |
| Shopify | POS integration, checkout discount processing | ISO 27001, SOC 2 Type II, PCI DSS Level 1 |
| Toast | POS integration (restaurant merchants) | SOC 2 Type II, PCI DSS |
| Resend | Transactional email delivery | SOC 2 Type II |
| Netlify | Web application hosting and CDN | SOC 2 Type II |
| Carto | Map tile rendering | ISO 27001, ISO 27701 |
When a sub-processor experiences a security incident that affects personal information we have shared with them, we will respond in accordance with Section 9 of this program.
The platform maintains server-side logging for API errors and authentication events through Supabase's built-in logging infrastructure and Netlify's access logs. GDPR data-request delivery failures are recorded to a dedicated database table for support review. The anomaly detection function (Section 5) provides automated monitoring of transaction patterns.
We do not currently operate a dedicated security information and event management (SIEM) system. Monitoring relies on infrastructure-level logging provided by our sub-processors and targeted application-layer logging for high-risk operations (authentication failures, GDPR requests, webhook rejections).
If a security incident is suspected, the following steps are taken:
Breach notification to affected individuals will describe: the nature of the breach, the categories of personal information involved, steps individuals can take to protect themselves, and a contact for further information.
To report a suspected security vulnerability, contact support@whitefang.ai. We will acknowledge the report and respond with our assessment.
This WISP is reviewed at least once per calendar year. It is also reviewed and updated whenever:
The effective date at the top of this document reflects the most recent review. Prior versions are retained internally.