Data Security & Compliance
Enterprise-grade security that protects your customers' data, payment information, and operational details with industry-leading compliance standards.
Security Certifications
Industry-recognized security standards for business data protection
SOC 2 (Type II – planned)
Implementing controls aligned to SOC 2 Trust Services Criteria; formal Type II attestation on our roadmap.
GDPR
GDPR-informed data protection and privacy compliance
ISO 27001
Information security management system
PCI DSS
We rely on PCI DSS–validated payment processors and follow their integration best practices.
Data Protection
Comprehensive security measures designed for your business operations
SOC 2–aligned controls
Our systems implement controls aligned to SOC 2 Trust Services Criteria for enterprise-grade security that protects your business data.
End-to-End Encryption
All data is encrypted in transit and at rest using industry-standard AES-256 encryption protocols.
Role-Based Access Control
Granular permissions ensure only authorized staff can access specific business data and AI configurations.
Secure Data Storage
Data is stored in encrypted databases with regular backups and disaster recovery protocols.
Infrastructure Security
Our cloud infrastructure is built on secure, compliant platforms with 99.9% uptime for your business operations.
Audit Logging
Comprehensive logging and monitoring ensure complete visibility into all AI interactions and data access.
Business-Specific Protections
Security measures tailored for your business data and operations
Customer Data Protection
- Encrypted storage of customer contact information
- Secure handling of service requests and booking data
- PCI DSS–aware payment integrations using validated payment processors
- Automatic data retention and deletion policies
Operational Security
- Secure AI model training with anonymized data
- Multi-location access controls for multi-location businesses
- Real-time monitoring of AI interactions
- Automated backup of business configurations
Security Documentation
Security overview and documentation available on request. Contact us to discuss your specific security requirements and compliance needs.
Request Security OverviewVendor Due-Diligence Pack
For financial institutions and enterprise customers, we can provide comprehensive documentation to support your vendor due-diligence and risk assessment processes.
Available Documentation
- Security overview and architecture diagrams
- Data-flow diagrams and system integration maps
- Standard responses for information-security questionnaires
- Business continuity and disaster recovery documentation
- Data processing agreements (DPA) templates
- Sub-processor lists and data residency information
Due-Diligence Support
- Information security assessments and questionnaires
- Operational risk reviews and documentation
- Financial stability and business continuity information
- Regulatory compliance verification (PIPEDA, GDPR, etc.)
- Data residency and sovereignty documentation
- Custom security questionnaires and audit support
This documentation supports the operational, financial, and information-security factors that financial institutions evaluate during third-party risk assessments, in alignment with OSFI guidelines and bank vendor due-diligence processes.
Request Vendor Due-Diligence PackQuestions About Security?
Our security team is available to discuss your organization's specific security requirements and compliance needs.