We use cookies to enhance your browsing experience and analyze site traffic. By continuing to use this site, you agree to our cookie policy. Privacy Policy

Data Security & Compliance

We understand the high sensitivity of biomedical R&D data. Click.mAb. platform ensures comprehensive data security and privacy from architecture design to operations management.

Our Security Commitment

All uploaded sequences, structure files, and project data are used exclusively for your authorized computational tasks. They will never be used for model training or shared with third parties. After project completion, you can delete data at any time, and we will thoroughly purge all related copies.

Security Architecture

Data Transmission Encryption

All data transmissions use TLS 1.2+ encryption protocols to prevent interception or tampering.

Secure Data Storage

User data is stored with AES-256 encryption. Databases implement strict access controls and audit logging.

Access Control & Authentication

Role-based access control (RBAC) with multi-factor authentication ensures only authorized personnel access relevant data.

Data Isolation

Strict tenant-level data isolation. Project data is stored independently with no cross-client access.

Key Management

Professional Key Management System (KMS) with regular key rotation ensures encryption keys remain secure.

Backup & Recovery

Automated multi-region backups with rapid disaster recovery ensure data availability and business continuity.

Full Data Lifecycle Protection

01

Data Upload

TLS encrypted transmission with integrity verification

02

Data Processing

Isolated compute environment, least privilege principle

03

Data Storage

AES-256 encryption, strict access controls

04

Data Usage

Complete audit logging, full operation traceability

05

Data Deletion

User-initiated deletion, automatic cleanup on expiry

Compliance & Certifications

Cybersecurity Protection

Platform security is built and managed according to national cybersecurity protection requirements.

Data Processing Compliance

Strict compliance with Personal Information Protection Law, Data Security Law, and other regulations.

Vulnerability Response

Comprehensive security incident response and vulnerability remediation with regular security assessments and penetration testing.

Cloud Infrastructure Security

Built on leading cloud providers, inheriting comprehensive physical, network, and host security protections.

Security FAQ

Will my uploaded data be used to train AI models?

No. All your data is used exclusively for your authorized computational tasks and will never be used for model training or any other purpose.

How is data handled after project completion?

You can delete project data at any time. Data not manually deleted will be automatically purged after the retention period specified in the service agreement.

Is data isolated between different clients?

Yes. We implement strict multi-tenant data isolation architecture. Each client's data is stored and processed independently with no possibility of cross-access.

Does the platform support team permission management?

Yes. The platform supports role-based access control. Project leads can flexibly set team member access permissions to ensure sensitive data is only visible to authorized personnel.

Have More Security Questions?

Our team is ready to answer any questions about data security.