Select Your Mac
How to check which chip your Mac has:
- Open the Apple menu () at the top left
- Select About This Mac
- Inside the "Overview" tab, look for "Processor" or "Chip"
- Check if it says "Intel" or "Apple"
Need more help? Visit our Help Center.
Need more help? Visit our Help Center.
Yac provides the below described technical and organizational security measures through its cloud infrastructure and data security Subprocessor, Amazon Web Services. Yac reserves the right to upgrade or otherwise modify its security measures and this Information Security policy at any time in its sole discretion; provided, however, that Yac will not materially degrade any security measures during the term of the Agreement.
All of our services and data are hosted in Amazon Web Services(AWS) facilities (S3, RDS) in the United States, and Vultr dedicated servers in the United States.
Our infrastructure and data are spread across multiple server nodes and AWS availability zones and are designed to continue to work should any one of the data centers or facilities fail, per AWS's disaster recovery practices and policies.
We produce audit logs for activity and for data storage devices we log all activity automatically. We regularly backup our servers using AWS's provided backup services.
Access to customer data is limited only to authorized personnel who require it for their job and on a need-to-know basis. All personnel who access customer data do so pursuant to written agreements with data protection obligations consistent with applicable law. Every service hosted on our servers is served over forced HTTPS only, with HTST enabled. We have a strict SAMLSingle Sign-on (SSO), 2-factor authentication (2FA), and strong password policies on critical cloud services used by our team like GitHub, Google, andAWS to ensure access to cloud services is protected.
All data sent to or from Yac is encrypted in transit using 256 bit encryption. Our APIs and application endpoints are TLS/SSL only. We only use strong cipher suites and have features such as HSTS enabled. We also encrypt data at rest using an industry-standardAES-256 encryption algorithm by making use of AWS's RDS encryption.
If you have any questions about these terms, let us know.