TechnologyResourcesCompany

Security & Compliance

Enterprise-grade security. Built in from day one.

Infrastructure Security

  • Hosted on AWS infrastructure
  • VPC isolation and private networking
  • Multi-region data redundancy
  • 24/7 infrastructure monitoring

Data Protection

  • AES-256 encryption at rest
  • TLS 1.3 encryption in transit
  • Zero data retention policy
  • Automatic data purging

Access Control

  • Single Sign-On (SSO) support
  • Multi-factor authentication
  • Role-based access control
  • Comprehensive audit logging

Compliance Roadmap

  • SOC 2 Type II (in progress)
  • Designed for GDPR compliance
  • Designed for CCPA compliance
  • Regular third-party security audits

Security-First Architecture

We handle sensitive M&A data. We build security into every layer of our platform. Our infrastructure meets the rigorous requirements of SOC 2 Type II certification.

We never train on your documents. Your data stays yours. Purged automatically after processing.

Report a Security Issue

We take security seriously. If you discover a vulnerability or have a security concern, please let us know.

All reports are treated confidentially. For urgent issues, email [email protected] directly.