Certifications

Compliance you can trust

We maintain the industry's most rigorous security certifications to protect your sensitive data.

๐Ÿ›ก๏ธ

SOC 2 Type II

Independently audited security controls

๐Ÿฅ

HIPAA

Healthcare data protection compliance

๐Ÿ‡ช๐Ÿ‡บ

GDPR

EU data protection regulation

๐Ÿ”’

ISO 27001

Information security management

๐Ÿ’ณ

PCI DSS

Payment card data security

๐Ÿ›๏ธ

FedRAMP

US federal cloud authorization

๐Ÿ‡จ๐Ÿ‡ฆ

CCPA

California consumer privacy

โœ…

HITRUST

Healthcare information trust

Security Practices

How we protect your data

๐Ÿ”

Encryption

AES-256 encryption at rest, TLS 1.3 in transit. All data is encrypted end-to-end with customer-managed keys available for Enterprise plans.

๐Ÿ—๏ธ

Infrastructure

Hosted on AWS with multi-region redundancy. VPC isolation, private subnets, and dedicated infrastructure options for sensitive workloads.

Access Control

Role-based access control (RBAC), SSO/SAML integration, MFA enforcement, and comprehensive audit logging of all data access.

๐Ÿ”

Monitoring

24/7 security monitoring, intrusion detection, anomaly alerting, and automated incident response. SOC team on-call around the clock.

๐Ÿงช

Testing

Annual penetration testing by third-party firms, continuous vulnerability scanning, and bug bounty program for responsible disclosure.

Compliance

Dedicated compliance team, regular internal audits, employee security training, and background checks for all personnel with data access.

Annotator Security

Secure human-in-the-loop workflows

Our annotator workforce operates under strict security protocols to ensure your data remains protected throughout the labeling process.

  • Background checks and NDA agreements for all annotators
  • Secure annotation environment with no data download capability
  • Watermarking and access tracking for sensitive content
  • Geo-fencing: restrict annotator access by country or region
  • Data compartmentalization: annotators see only their assigned tasks
  • Regular security awareness training for all workforce members
Security Controls โ€” Active
๐Ÿ”’ End-to-end encryption Active
๐ŸŒ Geo-fencing (US only) Active
๐Ÿ“‹ Audit logging Active
๐Ÿšซ Download prevention Active
๐Ÿ”‘ MFA enforcement Active

Need a security review?

Our security team is available to discuss your specific compliance requirements and provide detailed documentation.

Request security documentation