Page cover

Security Policy

Version: v3.0.0 Last updated: February 2026

1. Introduction

This Security Policy describes the technical, organizational, and administrative measures implemented by musen (the Company, we, us) to protect the confidentiality, integrity, and availability of data processed through the musen platform, including its website, applications, and associated services (collectively, the Service).

musen is an AI powered radio platform that processes user data to deliver personalized audio experiences, including AI curated radio streams and user generated audio segments. Security is a core operational priority, and this policy outlines how we approach risk management, system protection, access control, and incident response.

This document is intended to provide transparency regarding our security practices. It does not create contractual obligations beyond those defined in the Terms and Conditions or Privacy Policy, nor does it guarantee absolute security.

2. Scope

This Security Policy applies to:

  • All musen operated systems, infrastructure, and software components

  • All user data processed in connection with the Service

  • All employees, founders, contractors, and authorized collaborators with access to musen systems

  • All third party service providers engaged by musen where they interact with musen data or infrastructure

The policy covers security measures related to:

  • Application security

  • Infrastructure and hosting security

  • Authentication and access control

  • Data protection and storage

  • Monitoring and incident response

This policy does not cover third party platforms, services, or applications that are not operated or controlled by musen, even if they integrate with the Service.

3. Security Principles

musen security program is based on the following core principles.

3.1 Confidentiality

Access to systems and data is limited to authorized individuals and services only, based on role and operational necessity. Sensitive data is protected through access controls and encryption where appropriate.

3.2 Integrity

Safeguards are implemented to prevent unauthorized modification, corruption, or deletion of data. System changes are controlled, logged where feasible, and reviewed as part of normal operations.

3.3 Availability

Systems are designed to ensure reasonable availability of the Service, using modern cloud infrastructure, redundancy, and monitoring. While continuous uptime cannot be guaranteed, steps are taken to minimize service disruption.

3.4 Risk Based Approach

musen applies security controls proportionate to the nature of the data processed and the risks involved. As an evolving platform, security measures are periodically reviewed and adjusted based on operational needs, changes in the threat landscape, and business growth.

4. Access Control and Authentication

4.1 User Authentication

Users may access the musen Service through one or more of the following authentication methods:

  • Email address and password

  • Third party authentication via Google OAuth

At present, multi factor authentication is not enforced for user accounts. Users are responsible for maintaining the confidentiality of their credentials and for any activity conducted through their accounts.

4.2 Account Security Responsibilities

Users are expected to:

  • Choose strong passwords

  • Avoid reusing passwords across services

  • Notify musen promptly if they suspect unauthorized access to their account

musen reserves the right to suspend or restrict accounts where suspicious activity, abuse, or security risks are detected.

4.3 Internal Access Controls

Access to internal systems, administrative tools, and production environments is restricted to authorized personnel only. Access is granted based on role and operational necessity and is revoked when no longer required.

Internal access is logged and monitored where appropriate. Administrative credentials are protected using industry standard security practices.

4.4 Principle of Least Privilege

musen applies the principle of least privilege, meaning that individuals and systems are granted the minimum level of access necessary to perform their functions. This applies to:

  • Application services

  • Internal tools

  • Cloud infrastructure

5. Data Protection and Encryption

5.1 Data in Transit

musen uses industry standard transport security measures to protect data transmitted between user devices, musen services, and third party providers. Communications are encrypted using secure protocols such as HTTPS and TLS.

This applies to:

  • Website traffic

  • Application API requests

  • Authentication flows

  • Streaming and content delivery metadata

While encryption significantly reduces risk, no transmission method over the internet can be guaranteed to be completely secure.

5.2 Data at Rest

Where appropriate, data stored within musen controlled systems is protected using encryption at rest mechanisms provided by infrastructure and service providers.

Data at rest may include:

  • Account identifiers

  • Usage and interaction data

  • Personalization signals

  • System logs and metadata

Encryption standards and implementation details may evolve over time as infrastructure and providers change.

5.3 Data Minimization

musen limits data collection and storage to what is reasonably necessary to operate the Service, improve personalization, ensure security, and comply with legal obligations. Data retention periods are determined based on operational, legal, and security considerations.

6. Infrastructure and Hosting Security

6.1 Hosting Environment

musen operates on modern cloud based infrastructure provided by reputable third party hosting providers. Infrastructure may be geographically distributed and hosted outside Estonia, including within the European Union and other jurisdictions.

Physical security of data centers is managed by hosting providers and typically includes controlled physical access, surveillance and monitoring, and redundant power and environmental controls.

6.2 Network Security

Network level protections are implemented to reduce exposure to unauthorized access and common attack vectors. These may include firewalls and network segmentation, rate limiting and traffic filtering, and separation between production and non production environments.

6.3 System Updates and Maintenance

musen performs updates, patches, and configuration changes as part of ongoing system maintenance. Security related updates are prioritized based on severity and operational impact.

As a fast evolving platform, some updates may be deployed continuously or incrementally.

7. Third Party Services and Vendors

7.1 Use of Third Party Providers

musen relies on third party services to support core functionality, including cloud infrastructure and hosting, authentication providers, analytics and monitoring tools, and payment processors.

These providers may process data on musen behalf under contractual or technical safeguards.

7.2 Vendor Risk Management

musen selects third party providers based on functionality, reliability, and security practices appropriate to their role. While musen makes reasonable efforts to work with reputable providers, it does not control their internal security operations.

musen is not responsible for security incidents originating solely within third party systems outside its control.

7.3 Third Party Terms

Use of third party services may be subject to their own security policies, terms, and privacy practices. Users are encouraged to review those documents where applicable.

8. Monitoring, Logging, and Abuse Prevention

8.1 System Monitoring

musen monitors system performance, availability, and error conditions to ensure operational stability and detect potential security issues.

Monitoring data may include error logs, performance metrics, authentication attempts, and abuse or anomalous usage patterns.

8.2 Logging

Logs may be generated for security, debugging, and operational purposes. Logged data is accessed on a need to know basis and retained for limited periods consistent with operational and legal requirements.

8.3 Abuse and Misuse Detection

musen reserves the right to monitor usage patterns to detect fraudulent activity, automated abuse, unauthorized access attempts, and violations of the Terms and Conditions.

Where abuse or misuse is detected, musen may take corrective action, including restricting access, suspending accounts, or terminating services.

9. Security Incident Response

9.1 Incident Identification

A security incident may include unauthorized access, data exposure, system compromise, or other events that could affect the confidentiality, integrity, or availability of the Service.

musen investigates suspected incidents using available logs, monitoring data, and technical analysis.

9.2 Incident Response

Upon identification of a confirmed security incident, musen may contain and mitigate the incident, restore affected systems or services, assess the scope and impact, and implement corrective measures to reduce recurrence.

9.3 User and Authority Notification

Where required by applicable law, musen will notify relevant users and or supervisory authorities of data breaches or security incidents within legally mandated timeframes.

For users in the European Economic Area, this may include notification to the Estonian Data Protection Inspectorate where appropriate.

10. Data Retention and Deletion

musen retains system logs, security records, and operational metadata only for as long as reasonably necessary to maintain the security and integrity of the Service, detect and respond to incidents or abuse, and comply with legal, regulatory, or contractual obligations.

Where possible, security related data is anonymized or aggregated once it is no longer required in identifiable form.

When personal data is deleted pursuant to user requests or account closure, related security logs may be retained in a limited form where necessary to protect the Service, prevent fraud, or comply with applicable law.

11. User Responsibilities

While musen implements technical and organizational security measures, users also play a role in maintaining the security of their accounts and interactions with the Service.

Users are responsible for maintaining the confidentiality of their account credentials, using secure devices and up to date software, avoiding sharing account access with unauthorized parties, and promptly reporting suspected security incidents or unauthorized access.

musen is not responsible for security incidents resulting from user negligence, compromised devices, or third party account breaches outside the Company control.

12. Limitations and No Guarantee of Absolute Security

musen employs reasonable and proportionate security measures consistent with industry standards. However, no system can be guaranteed to be completely secure.

Security controls may evolve as the platform grows and threat landscapes change. Vulnerabilities may exist despite best efforts, and unauthorized access, misuse, or data compromise cannot be entirely eliminated.

This Security Policy does not constitute a guarantee, warranty, or representation that security incidents will never occur.

13. Changes to This Security Policy

musen reserves the right to update or modify this Security Policy at any time to reflect changes in technology, legal requirements, operational practices, or risk assessment.

Where changes are material, musen will make reasonable efforts to notify users through the Service or other appropriate channels. The Last updated date at the top of this document indicates when the most recent revisions were made.

Continued use of the Service after changes take effect constitutes acceptance of the updated Security Policy.

14. Contact Information

For security related questions, concerns, or incident reports, users may contact musen at:

Reports of potential vulnerabilities or incidents should include sufficient detail to allow investigation. musen appreciates responsible disclosure and good faith reporting.

Last updated