Data Security & Compliance

Enterprise-grade security that protects your customers' data, payment information, and operational details with industry-leading compliance standards.

SOC 2–aligned controls
GDPR-informed data protection
AES-256 Encryption

Security Certifications

Industry-recognized security standards for business data protection

SOC 2 (Type II – planned)

Implementing controls aligned to SOC 2 Trust Services Criteria; formal Type II attestation on our roadmap.

In Progress

GDPR

GDPR-informed data protection and privacy compliance

Implemented

ISO 27001

Information security management system

In Progress

PCI DSS

We rely on PCI DSS–validated payment processors and follow their integration best practices.

Implemented

Data Protection

Comprehensive security measures designed for your business operations

SOC 2–aligned controls

Our systems implement controls aligned to SOC 2 Trust Services Criteria for enterprise-grade security that protects your business data.

End-to-End Encryption

All data is encrypted in transit and at rest using industry-standard AES-256 encryption protocols.

Role-Based Access Control

Granular permissions ensure only authorized staff can access specific business data and AI configurations.

Secure Data Storage

Data is stored in encrypted databases with regular backups and disaster recovery protocols.

Infrastructure Security

Our cloud infrastructure is built on secure, compliant platforms with 99.9% uptime for your business operations.

Audit Logging

Comprehensive logging and monitoring ensure complete visibility into all AI interactions and data access.

Business-Specific Protections

Security measures tailored for your business data and operations

Customer Data Protection

  • Encrypted storage of customer contact information
  • Secure handling of service requests and booking data
  • PCI DSS–aware payment integrations using validated payment processors
  • Automatic data retention and deletion policies

Operational Security

  • Secure AI model training with anonymized data
  • Multi-location access controls for multi-location businesses
  • Real-time monitoring of AI interactions
  • Automated backup of business configurations

Security Documentation

Security overview and documentation available on request. Contact us to discuss your specific security requirements and compliance needs.

Request Security Overview
Security overview available on request
Compliance documentation available
Data protection guide available

Vendor Due-Diligence Pack

For financial institutions and enterprise customers, we can provide comprehensive documentation to support your vendor due-diligence and risk assessment processes.

Available Documentation

  • Security overview and architecture diagrams
  • Data-flow diagrams and system integration maps
  • Standard responses for information-security questionnaires
  • Business continuity and disaster recovery documentation
  • Data processing agreements (DPA) templates
  • Sub-processor lists and data residency information

Due-Diligence Support

  • Information security assessments and questionnaires
  • Operational risk reviews and documentation
  • Financial stability and business continuity information
  • Regulatory compliance verification (PIPEDA, GDPR, etc.)
  • Data residency and sovereignty documentation
  • Custom security questionnaires and audit support

This documentation supports the operational, financial, and information-security factors that financial institutions evaluate during third-party risk assessments, in alignment with OSFI guidelines and bank vendor due-diligence processes.

Request Vendor Due-Diligence Pack

Questions About Security?

Our security team is available to discuss your organization's specific security requirements and compliance needs.