Trust Center
Our approach to security, privacy, and compliance. Access runbooks, vendor registry, and diligence documents.
Program
Security
- RBAC & least-privilege access; JML with quarterly reviews
- Encryption in transit; at rest where applicable to scope
- Endpoint controls for managed devices; network allowlists or VPN/VDI
- Security training & phishing simulations; background checks per role
- Incident Response with severity targets and evidence requirements
Program
Privacy
- Data minimization and purpose limitation; retention aligned to contracts
- DPA/BAA available by scope; SCCs for cross-border as needed
- Subject rights workflow (access, delete, correct) via ticketed process
- Cookie controls; privacy-by-design in new lanes and dashboards
Program
Compliance
- Audit-ready evidence tiles supporting QA and metrics
- Change control for SOP/policy/version; training attestations
- Sub-processor registry with roles/regions and update history
- Regulator-facing dashboards (where applicable) and exports
Questions about security or privacy?
Our Trust team can align to your contract clauses and regulator timelines.