SECURITY & TRUST

Security is fundamental to everything we do.

Least privilege access, continuous monitoring, encryption by default, and full customer control over data.

DATA FLOW

1

Contract Upload

PDF ingestion

2

Party Extraction

Entity identification

3

Public Signals

Free-tier checks

4

Private Data

Paid escalation

5

Risk Output

Audit report

Data isolation & tenant separation

Every customer operates in a logically isolated environment.

Encryption in transit & at rest

TLS 1.3 for all connections. AES-256 encryption for data at rest. Zero plaintext storage.

Access controls & audit logging

Role-based access, MFA enforcement, and complete audit trails for every action.

Vendor risk & data minimization

We vet every vendor. Only the minimum data required for each function is shared.

No training on your data

Customer data is never used to train foundation models. This is contractual and enforceable.

Incident readiness

Continuous monitoring, defined response procedures, and regular tabletop exercises.

DATA SEPARATION: PUBLIC VS PRIVATE

Standard Checks

Sanctions lists, litigation records, and business registries. Instant triage at the standard tier.

Public registries, identity data, domain checks, sanctions lists.

Deep Verification (Upgrade)

50+ layers of public and private data. Vendor data, enriched datasets, fraud indicators, financial checks.

Results are scoped to your account and never shared across customers.

Escalation-based access: Private sources are accessed only on explicit request. We do not run paid checks without your authorization.

DATA CONTROL & PORTABILITY

You own your data. Export reports in PDF or JSON anytime. Request deletion and we will comply within 30 days.

No lock-in. No hidden retention. No data ransom.

FREQUENTLY ASKED QUESTIONS

TRUST CENTER

SOC 2 readiness in progress. Security documentation available on request.

Security Overview (PDF)

Available on request

Subprocessors List

Available on request

Data Processing Agreement

Available on request

Penetration Test Summary

Available on request

Contact Security Team

Report issues, request documentation, or contact us directly.

security@verify.inc