Kettle Muscle

Information Security Program

Last updated: April 23, 2026 Version: 2

This document is the written Information Security Program for Kettle Muscle, maintained as required under:

It is referenced in §9 of our Privacy Policy.


1. Scope and ownership

Program owner. Pulkit Kakkar, acting as both the data controller and the security owner of the service, is responsible for this program.

Scope. All personal information collected, processed, or stored in connection with the Kettle Muscle mobile application and associated Firebase backend.

Risk posture. Kettle Muscle is a solo-developer, pre-revenue, consumer fitness app. Security controls are sized to the scale of the operation while meeting the legal minimums listed above.


2. Risk assessment

Annually, and whenever a material change occurs, we identify and evaluate reasonably foreseeable internal and external risks to the confidentiality, security, and integrity of personal information. The current risk register includes:

RiskLikelihoodImpactPrimary mitigations
Stolen or lost deviceMediumMedium (user's own data; other users unaffected)Per-user isolation at the backend; on-device encryption by iOS; Secure Enclave for BYO-AI keys
Compromised Firebase project credentialLowHighMFA on the Firebase console owner account; least-privilege service accounts; App Check; quarterly credential review
Malicious actor impersonating another userMediumHighFirebase Auth + App Check + Firestore rules enforce per-UID isolation; every write is attested by App Check
Data exfiltration via compromised SDK / supply chainLowHighPinned dependency versions; lockfile committed; only vetted third parties (Firebase ecosystem); no ad SDK
Cross-border transfer riskN/A (mitigation, not a risk itself)High (regulatory)SCCs / UK IDTA / LGPD contractual safeguards; documented Quebec PIA
Insider riskLowLowPulkit is the sole admin; no shared credentials; no employees
Under-age enrolmentMediumMedium (COPPA liability)Client-enforced age gate before any PII collection; server-side ageVerified field
AI provider leakage of prompt dataMedium (provider-side)MediumBYOK architecture — keys and prompts go direct from device to provider; we see nothing
Account-deletion failure mid-cascadeLowMedium"Deleting" sentinel written before cascade; resumable from crash

3. Technical controls

3.1 Encryption

3.2 Authentication and authorisation

3.3 Data minimisation and segregation

3.4 Secure software development

3.5 Logging and monitoring


4. Organisational controls


5. Incident response

If we become aware of a suspected or actual compromise of personal information, we follow this procedure:

  1. Contain. Revoke compromised credentials, invalidate sessions, disable affected features.
  2. Assess. Determine scope: which users, which data categories, which jurisdictions.
  3. Record. Log the incident, response, timeline, and decisions.
  4. Notify regulators where required:
    • GDPR / UK GDPR — within 72 hours of becoming aware, to the lead supervisory authority, if the breach is likely to result in a risk to rights and freedoms (Art. 33).
    • LGPD — within a reasonable timeframe, to the ANPD (Art. 48).
    • DPDPA — to the Data Protection Board of India once operational.
    • PIPEDA — without delay, to the Office of the Privacy Commissioner of Canada, if the breach creates a real risk of significant harm.
    • US state laws — per the specific state's timeline (e.g., California Civil Code §1798.82 "in the most expedient time possible").
  5. Notify affected users without undue delay where required by the applicable law, and always when the breach is likely to result in a high risk to their rights.
  6. Remediate. Close the root cause; update this program, and the Retention Policy or Privacy Policy where relevant.

Breach register. All security incidents involving personal information, regardless of whether they meet a notification threshold, are logged in our internal breach register with enough detail to permit regulator review. The register is retained for at least 24 months, as required by PIPEDA §10.3 and the Breach of Security Safeguards Regulations (SOR/2018-64), and for any longer period required by other applicable law.


6. Data subject request handling

Requests to access, correct, delete, export, or otherwise exercise data-subject rights under any of the laws listed in the Preamble are handled as follows:

  1. Request arrives at contact@kettlemuscle.com.
  2. Verify the requester is the account holder (typically by confirming an action from within the authenticated app or by matching the email).
  3. Fulfil within the applicable deadline — in every case within 30 days of verification, extendable by 30 additional days where reasonably necessary (or 45 days under WMHMDA) with notice to the requester.
  4. Log the request, response, and outcome in the compliance ledger; retained per §2 of the Retention Policy.

Users may exercise most of these rights directly from the app under Profile → Privacy:


7. Cross-border transfer safeguards

Firebase infrastructure hosts data in the United States. For each region from which users access the service, we document the corresponding transfer mechanism in §7 of the Privacy Policy.

8. Written compliance artifacts we maintain

We maintain the following internal documents, available in summary form to a user or regulator on request:


9. Changes to this program

Material changes bump the version number at the top of this document. Routine wording updates update the date. The program is reviewed at least annually, and whenever the risk register materially changes.


10. Contact

Security-related enquiries, including vulnerability reports, go to contact@kettlemuscle.com with the subject line "Security". We do not yet operate a formal bug-bounty programme; we will acknowledge legitimate reports and not pursue good-faith security researchers who follow responsible-disclosure practice.

End of Information Security Program.