SECURITY & TRUST

Security is fundamental to everything we do.

We operate on a security-first model. Least privilege access, continuous monitoring, encryption by default, and complete customer control over data.

DATA FLOW

1

Contract Upload

PDF ingestion

2

Party Extraction

Entity identification

3

Public Signals

Free-tier checks

4

Private Data

Paid escalation

5

Risk Output

Audit report

Data isolation & tenant separation

Every customer operates in a logically isolated environment with strict boundaries.

Encryption in transit & at rest

TLS 1.3 for all connections. AES-256 encryption for data at rest. Zero plaintext storage.

Access controls & audit logging

Role-based access, MFA enforcement, and complete audit trails for every action.

Vendor risk & data minimization

We vet every vendor and only share the minimum data required for their specific function.

No training on your data

Customer data is never used to train foundation models. This is contractual and enforceable.

Incident readiness

Continuous monitoring, defined response procedures, and regular tabletop exercises.

DATA SEPARATION: PUBLIC VS PRIVATE

Standard Checks

Access to public data sources including sanctions lists, litigation records, and business registries. Instant triage to show risk level.

Public registries, identity data, domain checks, sanctions lists.

Deep Verification (Upgrade)

Access all 50+ layers of public and private data. Vendor and partner data, enriched datasets, fraud indicators, financial checks.

Results are scoped to your account and never shared across customers.

Escalation-based access: Private data sources are only accessed when you explicitly request deeper checks or upgrade. We never run paid checks without authorization.

DATA CONTROL & PORTABILITY

You own your data. Export reports in PDF or JSON anytime. Configure retention policies that fit your compliance requirements. Request deletion and we'll comply within 30 days.

No lock-in. No hidden retention. No data ransom.

FREQUENTLY ASKED QUESTIONS

TRUST CENTER

SOC 2 readiness program in progress. Security overview, subprocessor list, DPA, and penetration test summaries available on request.

Security Overview (PDF)

Available on request

Subprocessors List

Available on request

Data Processing Agreement

Available on request

Penetration Test Summary

Available on request

Contact Security Team

Report vulnerabilities, request security documentation, or ask questions.

security@verify.inc