Security & Compliance

Trust Center

Your data security is foundational to everything we build. Here is how we protect it.

Certifications & Standards

Industry-recognized frameworks that validate our security posture.

SOC 2 Type II

In Progress

We are actively working towards SOC 2 Type II certification, demonstrating our commitment to the highest standards of security, availability, and confidentiality.

GDPR

In Progress

TexAu is committed to processing personal data in accordance with applicable data protection laws, including the GDPR. We offer DPAs upon request and support data subject rights.

256-bit Encryption

Active

All data is encrypted at rest and in transit using AES-256 encryption. Your credentials, API keys, and enrichment results are never stored in plain text.

High Availability

Active

Enterprise-grade reliability with commercially reasonable uptime commitments. Our infrastructure is built on redundant cloud systems with automatic failover and real-time monitoring.

Security Practices

How we protect your data across every layer of our platform.

Access Controls

Role-based access control (RBAC) with least-privilege principles. Multi-factor authentication enforced for all team members with access to production systems.

Infrastructure Security

Hosted on enterprise-grade cloud infrastructure with network segmentation, DDoS protection, web application firewalls, and automated vulnerability scanning.

Data Handling

Strict data retention policies with automated purging. Customer data is logically isolated. We never share, sell, or use your data for training models.

Incident Response

Documented incident response plan with defined escalation paths. Customers are notified within 72 hours of any confirmed data breach per GDPR requirements.

Vendor Management

All third-party data providers and sub-processors are vetted for security compliance. We maintain a public list of sub-processors and notify customers of changes.

Continuous Monitoring

Real-time logging and alerting across all systems. Regular penetration testing by independent security firms. Bug bounty program for responsible disclosure.

Data Privacy & Legal

Transparency in how we handle your data and the policies that govern it.

Data Processing Agreement

Standard DPA available for all customers upon request, covering GDPR Article 28 requirements.

Request DPA

Privacy Policy

Full details on how we collect, process, and protect your personal data.

Read policy

Payments Policy

Credit purchases, subscription billing, refund policies, and payment security details.

Read policy

Terms & Conditions

Service terms including data ownership, liability, and acceptable use policies.

Read terms

Have security questions?

Our team is ready to answer your security and compliance questions, provide documentation, or schedule a security review.

Contact Sales

See your first enriched leads in 2 minutes

No credit card. No onboarding call. Just paste your list and watch it fill.

Up and running in 2 minutes. No credit card required.