Trust Center
Your data security is foundational to everything we build. Here is how we protect it.
Certifications & Standards
Industry-recognized frameworks that validate our security posture.
SOC 2 Type II
In ProgressWe are actively working towards SOC 2 Type II certification, demonstrating our commitment to the highest standards of security, availability, and confidentiality.
GDPR
In ProgressTexAu is committed to processing personal data in accordance with applicable data protection laws, including the GDPR. We offer DPAs upon request and support data subject rights.
256-bit Encryption
ActiveAll data is encrypted at rest and in transit using AES-256 encryption. Your credentials, API keys, and enrichment results are never stored in plain text.
High Availability
ActiveEnterprise-grade reliability with commercially reasonable uptime commitments. Our infrastructure is built on redundant cloud systems with automatic failover and real-time monitoring.
Security Practices
How we protect your data across every layer of our platform.
Access Controls
Role-based access control (RBAC) with least-privilege principles. Multi-factor authentication enforced for all team members with access to production systems.
Infrastructure Security
Hosted on enterprise-grade cloud infrastructure with network segmentation, DDoS protection, web application firewalls, and automated vulnerability scanning.
Data Handling
Strict data retention policies with automated purging. Customer data is logically isolated. We never share, sell, or use your data for training models.
Incident Response
Documented incident response plan with defined escalation paths. Customers are notified within 72 hours of any confirmed data breach per GDPR requirements.
Vendor Management
All third-party data providers and sub-processors are vetted for security compliance. We maintain a public list of sub-processors and notify customers of changes.
Continuous Monitoring
Real-time logging and alerting across all systems. Regular penetration testing by independent security firms. Bug bounty program for responsible disclosure.
Data Privacy & Legal
Transparency in how we handle your data and the policies that govern it.
Data Processing Agreement
Standard DPA available for all customers upon request, covering GDPR Article 28 requirements.
Request DPA →Payments Policy
Credit purchases, subscription billing, refund policies, and payment security details.
Read policy →Terms & Conditions
Service terms including data ownership, liability, and acceptable use policies.
Read terms →Have security questions?
Our team is ready to answer your security and compliance questions, provide documentation, or schedule a security review.
Contact SalesSee your first enriched leads in 2 minutes
No credit card. No onboarding call. Just paste your list and watch it fill.
Up and running in 2 minutes. No credit card required.