Security

Built with security in mind: protecting your data

Protecting your data, and your peace of mind.

Employing top-tier solutions to safeguard your information, empowering your growth with unwavering confidence.
image of a padlock

Protecting your information

SOC2 Compliance

We are SOC 2 certified. We undergo annual third-party audits to verify our security controls meet the highest industry standards.

Strong Encryption

Your data is encrypted at rest (AES-256) and in transit (TLS 1.2+), keeping your information private and secure at every stage.

Authentication

All accounts are protected by multi-factor authentication (MFA), with every login monitored for unauthorized access attempts.

Privacy

All staff and partners are bound by strict confidentiality agreements and trained regularly on data protection and privacy compliance.

Infrastructure

Hosted on Google Cloud and AWS with multi-region architecture, ensuring high availability, resilience, and business continuity.

Availability and Redundancy

Your data is protected by geographically dispersed redundancy zones, automated backups, and regularly tested disaster recovery plans.

hand lock icon

Data Handling

Documents you upload are processed securely and not used for any purpose beyond your workflow. Only authorized personnel can access your data, and all access is logged and audited.

checklist board

Penetration Testing

In addition to SOC 2 audits, we conduct annual third-party penetration tests to proactively identify and address vulnerabilities.

hand shake icon

Vendor Security

We assess all third-party vendors against a defined risk framework before approval, evaluating their access to customer data, production integrations, and potential business impact. Only vendors meeting our security standards are approved.

key icon

Access Controls

We enforce MFA and SSO across all systems, and restrict network traffic to authorized services only. Access is granted on a least-privilege basis and reviewed regularly.

laptop with shield icon

Device Security

All company devices are managed, encrypted, and monitored. Access to production systems is restricted to authorized, secured devices only.

training icon (avatar and whiteboard)

Training

All staff complete security awareness training upon joining and on an ongoing basis, covering data protection, phishing, and secure handling of customer information.

shield with crossed out bug

Vulnerability Management

We continuously monitor for vulnerabilities across our infrastructure and applications, prioritizing and remediating issues based on risk severity.

db back up icon

Backups

Customer data is backed up automatically and stored securely across multiple locations. Backups are tested regularly to ensure reliable recovery in the event of an incident.

security lock and envelope image

Security contact

To report a security concern or request a data processing agreement (DPA), contact us at security@docunlock.com.