How we protect customer data. Infrastructure, encryption, development practices, and compliance - written plainly, reviewed regularly, and open to scrutiny.
Security is the foundation of the platform, not a feature added to it. Every layer - infrastructure, application, data, operations - is designed with the assumption that an attacker is trying to defeat it.
We treat customer data as confidential by default: isolated per customer, encrypted end to end, and never used to train models or shared outside the vetted sub-processors listed in our privacy documentation.
The service runs on top-tier cloud providers with data residency and edge protection appropriate for regulated customers.
All customer data is encrypted both at rest and in transit, with logical isolation between tenants.
Security is integrated into how we build and ship, not tacked on before release.
Production access is tightly controlled, continuously logged, and tested against real recovery scenarios.
We hold ourselves to frameworks your procurement and legal teams already recognise.
| Framework | Scope | Status |
|---|---|---|
| GDPR | Full compliance with EU data protection standards. We act as a Data Processor. | Active |
| ISO/IEC 27001:2022 | Aligned with the international information security management standard. | Aligned |
| SOC 2 Type II | Security, Availability, and Confidentiality trust criteria. | Planned 2027/28 |
For security documentation (SOC 2 status, penetration test summaries, DPA templates) or to report a vulnerability, contact the addresses below.