SECURITY & TRUST
Least privilege access, continuous monitoring, encryption by default, and full customer control over data.
DATA FLOW
Contract Upload
PDF ingestion
Party Extraction
Entity identification
Public Signals
Free-tier checks
Private Data
Paid escalation
Risk Output
Audit report
Every customer operates in a logically isolated environment.
TLS 1.3 for all connections. AES-256 encryption for data at rest. Zero plaintext storage.
Role-based access, MFA enforcement, and complete audit trails for every action.
We vet every vendor. Only the minimum data required for each function is shared.
Customer data is never used to train foundation models. This is contractual and enforceable.
Continuous monitoring, defined response procedures, and regular tabletop exercises.
DATA SEPARATION: PUBLIC VS PRIVATE
Sanctions lists, litigation records, and business registries. Instant triage at the standard tier.
Public registries, identity data, domain checks, sanctions lists.
50+ layers of public and private data. Vendor data, enriched datasets, fraud indicators, financial checks.
Results are scoped to your account and never shared across customers.
Escalation-based access: Private sources are accessed only on explicit request. We do not run paid checks without your authorization.
DATA CONTROL & PORTABILITY
You own your data. Export reports in PDF or JSON anytime. Request deletion and we will comply within 30 days.
No lock-in. No hidden retention. No data ransom.
FREQUENTLY ASKED QUESTIONS
TRUST CENTER
SOC 2 readiness in progress. Security documentation available on request.
Security Overview (PDF)
Available on request
Subprocessors List
Available on request
Data Processing Agreement
Available on request
Penetration Test Summary
Available on request
Report issues, request documentation, or contact us directly.
security@verify.inc