blue and white gradient banner

Recipe Costing’s Statement on Security and Compliance


Ensuring that our platform remains secure is imperative to our business. Our highest priority is protecting your data and your privacy. Every employee must sign a Data Access Policy that binds them to the terms of our data confidentiality policies, available at terms and privacy. Access rights are based on employee’s job function and role.

Our security strategy covers all aspects of our business and includes the following:

  • Infrastructure
  • Software Development Lifecycle
  • Security
  • Hosting Security
  • Data Rights
  • How to Contact Recipe Costing Software about Security Questions
  • How to Report a Security Incident
  • Certifications

Infrastructure uses Rackspace and Amazon Web Services to manage user data. utilizes both cloud and physical servers in our infrastructure. Our physical servers are located in Tier-4 data centers with full power, cooling, and network redundancy.

Software Development Lifecycle uses the git revision control system. Changes to code base begin at our development servers undergo automated tests and are reviewed by our management development team. Once the code passes the testing system, changes are moved to our staging (beta) servers where our tech support team test all changes prior to moving it to our production servers. We also work with security professionals to test our code for common exploits and network scanning tools against our production servers.


We value your data, and we work hard to protect it. RackSpace provides multiple network hosts, multiple locations with regularly scheduled backups. Data is replicated with multiple redundancies and protected by bio metric locks, hardware and software fire walls, multiple layers of access security, and 24×7 interior and exterior surveillance. As an extra precaution, we take regular snapshots of the database and securely move them to a separate data center so that we can restore our software and database in the event of a regional failure.

Hosting Security

Only our software engineering management teams have access to our production environment and our software engineering teams have access to our staging and beta sites. VPN, SSH keys and 2-Step Verification are required for console access to servers in all of our environments. Automated processes are in place to monitor hosting environments, unauthorized login attempts and IP addresses that are automatically blacklisted.

Data Rights uses third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run Kitchen Porter Tech LLC d/b/a owns the code, database, application and you retain rights to your data.

How to Contact about Security Questions

  • Web: – Look for chat
  • Phone: 305-791-1451
  • Email:

How to Report a Security Incident

To report incidence abuse, misuse, or a security breach or on a single account, please contact chat.

Certifications and Standards

RackSpace adheres to the following information security and related certifications and standards.

  • ISO 27002
  • ISO 27001
  • SSAE16
  • SOC 1
  • SOC 2
  • SOC 3