SOC 2 Compliant
We undergo annual SOC 2 Type II audits, demonstrating our commitment to:- Security: Protecting data against unauthorized access
- Availability: Ensuring systems are operational and accessible
- Processing Integrity: Ensuring data processing is complete, valid, and authorized
- Confidentiality: Protecting confidential information
- Privacy: Collecting, using, and disclosing personal information in accordance with our privacy policy
Infrastructure Security
- Encryption: All data encrypted in transit (TLS 1.3) and at rest (AES-256)
- Access Control: Role-based access control with principle of least privilege
- Infrastructure Security: Hosted on SOC 2 compliant cloud providers
- Regular Audits: Quarterly security assessments and annual penetration testing
- Data Retention: Configurable retention policies with automatic data deletion