SECURITY & TRUST
We operate on a security-first model. Least privilege access, continuous monitoring, encryption by default, and complete customer control over data.
DATA FLOW
Contract Upload
PDF ingestion
Party Extraction
Entity identification
Public Signals
Free-tier checks
Private Data
Paid escalation
Risk Output
Audit report
Every customer operates in a logically isolated environment with strict boundaries.
TLS 1.3 for all connections. AES-256 encryption for data at rest. Zero plaintext storage.
Role-based access, MFA enforcement, and complete audit trails for every action.
We vet every vendor and only share the minimum data required for their specific function.
Customer data is never used to train foundation models. This is contractual and enforceable.
Continuous monitoring, defined response procedures, and regular tabletop exercises.
DATA SEPARATION: PUBLIC VS PRIVATE
Access to public data sources including sanctions lists, litigation records, and business registries. Instant triage to show risk level.
Public registries, identity data, domain checks, sanctions lists.
Access all 50+ layers of public and private data. Vendor and partner data, enriched datasets, fraud indicators, financial checks.
Results are scoped to your account and never shared across customers.
Escalation-based access: Private data sources are only accessed when you explicitly request deeper checks or upgrade. We never run paid checks without authorization.
DATA CONTROL & PORTABILITY
You own your data. Export reports in PDF or JSON anytime. Configure retention policies that fit your compliance requirements. Request deletion and we'll comply within 30 days.
No lock-in. No hidden retention. No data ransom.
FREQUENTLY ASKED QUESTIONS
TRUST CENTER
SOC 2 readiness program in progress. Security overview, subprocessor list, DPA, and penetration test summaries available on request.
Security Overview (PDF)
Available on request
Subprocessors List
Available on request
Data Processing Agreement
Available on request
Penetration Test Summary
Available on request
Report vulnerabilities, request security documentation, or ask questions.
security@verify.inc