Security

Built like the bar is loaded.

Overload is engineered to keep your account, training history, and photos safe. Here's what we do under the hood and what you can do on your end.

Last updated · April 23, 2026
Jump to section
01

Our Approach

02

Encryption

03

Infrastructure

04

Access Controls

05

Authentication

06

Data Minimization

07

Monitoring & Incident Response

08

Responsible Disclosure

09

What You Can Do

10

Compliance & Certifications

11

Contact