Skip to main content

SOC 2 Compliant

We undergo annual SOC 2 Type II audits, demonstrating our commitment to:
  • Security: Protecting data against unauthorized access
  • Availability: Ensuring systems are operational and accessible
  • Processing Integrity: Ensuring data processing is complete, valid, and authorized
  • Confidentiality: Protecting confidential information
  • Privacy: Collecting, using, and disclosing personal information in accordance with our privacy policy

Infrastructure Security

  • Encryption: All data encrypted in transit (TLS 1.3) and at rest (AES-256)
  • Access Control: Role-based access control with principle of least privilege
  • Infrastructure Security: Hosted on SOC 2 compliant cloud providers
  • Regular Audits: Quarterly security assessments and annual penetration testing
  • Data Retention: Configurable retention policies with automatic data deletion