Security & Compliance Statement

Security is Our Priority

We implement industry-leading security measures to protect your data.

Certifications & Compliance

CertificationStatusDescription
SOC 2 Type II✅ CertifiedAnnual third-party audit of security controls
ISO 27001✅ CertifiedInternational information security management
GDPR✅ CompliantEU data protection regulation
CCPA/CPRA✅ CompliantCalifornia privacy regulations
HIPAA✅ ReadyAvailable for healthcare customers with BAA

Data Security

Encryption

  • In Transit: TLS 1.2+ for all data transmission
  • At Rest: AES-256 encryption for all stored data
  • Backups: Encrypted with separate keys
  • Database: Field-level encryption for sensitive data

Access Control

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA) available
  • Single Sign-On (SSO) support via SAML 2.0
  • Least privilege principle enforced
  • Regular access reviews

Authentication

  • Strong password requirements
  • Account lockout after failed attempts
  • Session timeout after inactivity
  • IP whitelisting available

Infrastructure Security

Hosting

  • Cloud Provider: Microsoft Azure / AWS (Tier IV data centers)
  • Regions: US, EU (data residency options available)
  • Redundancy: Multi-zone deployment
  • DDoS Protection: Automated mitigation

Network Security

  • Firewalls and network segmentation
  • Intrusion detection and prevention systems (IDS/IPS)
  • Web Application Firewall (WAF)
  • Regular vulnerability scanning
  • Annual penetration testing

Application Security

  • Secure development lifecycle (SDLC)
  • Code reviews and static analysis
  • Dependency scanning for vulnerabilities
  • OWASP Top 10 protection
  • SQL injection prevention
  • Cross-site scripting (XSS) protection

Data Backup & Recovery

  • Backup Frequency: Daily automated backups
  • Backup Retention: 30 days
  • Backup Location: Geographically separate region
  • Recovery Time Objective (RTO): 4 hours
  • Recovery Point Objective (RPO): 24 hours
  • Testing: Quarterly disaster recovery drills

Security Monitoring

  • 24/7 Security Operations Center (SOC)
  • Real-time threat detection
  • Automated security alerts
  • Log aggregation and analysis
  • Incident response team

Employee Security

Background Checks

  • All employees undergo background screening
  • Enhanced checks for privileged access

Training

  • Annual security awareness training
  • Phishing simulation exercises
  • Role-specific security training
  • Incident response training

Confidentiality

  • All employees sign NDAs
  • Data access on need-to-know basis
  • Secure offboarding procedures

Incident Response

Security Incidents

Our incident response process:

  1. Detection: Automated monitoring and alerts
  2. Containment: Immediate action to limit impact
  3. Investigation: Root cause analysis
  4. Remediation: Fix vulnerabilities
  5. Notification: Inform affected parties within 72 hours
  6. Post-Mortem: Document lessons learned

Data Breaches

In the event of a data breach:

  • Customer notification within 72 hours
  • Regulatory notification as required
  • Detailed incident report provided
  • Remediation plan and timeline
  • Offer of credit monitoring if applicable

Vendor Management

  • Due diligence on all vendors
  • Security questionnaires required
  • Data Processing Agreements (DPAs) in place
  • Annual vendor security reviews
  • Subprocessor list maintained

Physical Security

Our data center providers implement:

  • 24/7 security personnel
  • Biometric access controls
  • Video surveillance
  • Environmental controls
  • Power redundancy (N+1)

Audit & Compliance

  • External Audits: Annual SOC 2 and ISO 27001
  • Internal Audits: Quarterly security reviews
  • Compliance Monitoring: Continuous monitoring
  • Reports Available: SOC 2 reports upon request

Customer Responsibilities

Shared responsibility for security:

  • Maintain strong passwords
  • Enable multi-factor authentication
  • Manage user access appropriately
  • Report security concerns promptly
  • Keep contact information current
  • Review audit logs regularly

Security Features for Customers

  • IP whitelisting
  • Session management controls
  • Audit logs (90-day retention)
  • Data export capabilities
  • Custom data retention policies
  • API rate limiting

Report Security Issues

Security Contact

If you discover a security vulnerability:

📧 Email: [email protected]

🔒 PGP Key: Available upon request

⚠️ Please do not publicly disclose until we’ve had time to address

Continuous Improvement

We continuously enhance our security posture through:

  • Regular security assessments
  • Emerging threat monitoring
  • Security research and development
  • Industry best practice adoption
  • Customer feedback integration