Our Trust Center offers a centralized resource for understanding how we protect your data and uphold the integrity of our platform. It provides in-depth information about our security architecture, data encryption methods, access controls, and continuous monitoring systems. You'll also find details on our compliance with industry standards and regulations such as GDPR, CPCA, and ISO 27001.
Our Trust Center offers a centralized resource for understanding how we protect your data and uphold the integrity of our platform....
All customer data is encrypted at rest and in transit.
Product Security
Role-based access control with least-privilege principle.
Product Security
Regular automated scanning of all production systems.
Product Security
Security requirements baked into every phase of the development lifecycle.
Product Security
Mandatory peer and automated security code reviews for all changes.
Product Security
Annual security awareness training (phishing, social engineering, etc.).
Internal Security
Mobile Device Management (MDM) enforced on all company-issued devices.
Internal Security
Comprehensive pre-employment screening for all staff.
Internal Security
Required for access to all critical internal systems.
Internal Security
Centralized log aggregation with real-time alerting on suspicious activity.
Internal Security
Formal monthly OS and application patching cadence.
Internal Security
Data-Processing Agreements, data subject rights process, and breach notification.
Compliance
Technical, administrative, and physical safeguards per HIPAA rules.
Compliance
Maintained ISO/IEC 27001:2013 Information Security Management System.
Compliance
Consumer privacy rights, opt-out processing, and transparency notices.
Compliance
Documented IR plan, tabletop exercises and annual full-scale tests.
Operational & Governance
BCP/DR plans with quarterly recovery-drills and RTO/RPO targets.
Operational & Governance
Formal change-approval board, scheduled maintenance windows, audit logging.
Operational & Governance
Automated discovery and blocking of unauthorized data transfers.
Operational & Governance
Badge access controls, CCTV monitoring, and visitor management at all offices.
Operational & Governance
Annual security assessments and contractual controls for all vendors.
Operational & Governance