Skip to main content
← Back to Home

Security at Commera

Last Updated: May 8, 2026

This page summarizes how Commera LLC protects applicant data, the third-party services we rely on, and how to reach us if you discover a security vulnerability. It supplements our Privacy Policy and Terms of Service.

1. Encryption

In transit: all traffic between your browser and our site, and between our application and our service providers, is encrypted using TLS 1.2 or higher with modern cipher suites. HTTP requests are redirected to HTTPS at the platform edge (Vercel) and we set the Strict-Transport-Security header to instruct browsers to refuse plaintext connections.

At rest: applicant data is stored only inside our managed third-party services (Zoho CRM, Upstash Redis, Vercel logs). All three providers encrypt data at rest using AES-256 or equivalent, with provider-managed keys. Commera does not maintain a self-hosted database; we do not write applicant data to local disk.

2. Hosting & Subprocessors

Commera runs on a small set of third-party services. The following list names every provider that may process applicant personal information on our behalf:

We do not currently use any third-party analytics, advertising, or tracking services. If we add any, we will update this page and our Privacy Policy.

3. Access Controls

Access to systems that process applicant data is limited to personnel with a documented business need. Production access requires multi-factor authentication. Credentials are never committed to source control and are rotated when personnel leave.

4. Application Security

5. Data Retention

Applicant records are retained as described in Privacy Policy § 10 — generally seven years from the most recent application or transaction, consistent with financial-services recordkeeping requirements. Rate-limit counters auto-expire one hour after they are written.

6. Breach Notification

If we confirm an unauthorized access event affecting applicant personal information, we will notify affected applicants and the applicable state regulators within the timeframe required by law — and in any event no later than 72 hours after confirmation, where practicable. We will provide the categories of information affected, what we have done to contain the incident, and steps applicants can take to protect themselves.

7. Compliance Posture

8. Vulnerability Disclosure

If you have discovered a security vulnerability affecting Commera, please email contact@commerafunding.com with "Security Disclosure" in the subject line. We aim to acknowledge reports within two business days. We do not currently run a paid bug bounty program.

In scope: commerafunding.com and any subdomain owned by Commera LLC.
Out of scope: vulnerabilities in third-party services listed in Section 2 (please report those directly to the vendor); social-engineering of Commera personnel; volumetric attacks against the platform.

Researchers who follow this process and act in good faith will not be subject to legal action by Commera. We will publicly credit responsible disclosure on this page with the reporter's consent.

9. Contact

Commera LLC
Attention: Security
5830 E 2nd St, Casper, WY 82609
Email: contact@commerafunding.com
Phone: +1 (888) 451-5255

This page describes Commera's security practices as of the Last Updated date above. It is informational and does not create any contractual obligation beyond what is stated in our Terms of Service.