Security

Program

Privacy-by-design, data minimization, and strong encryption in transit and at rest.

Controls

Access controls, audit logging, and incident response procedures.

Compliance

DPA on request. SOC program roadmap available upon request.