SOC 2 Compliant
Security is a core priority for our company and is built into how we design, operate, and scale our platform. We follow industry best practices to protect customer data, including strong access controls, encryption of sensitive information, and continuous monitoring of our systems. Our security program is reviewed regularly and evolves alongside our product to ensure we maintain a high standard of data protection as we grow.
We are committed to transparency and continuous improvement. As part of that commitment, we are actively working toward SOC 2 compliance and aligning our internal controls with recognized security and privacy standards. Customers can review detailed information about our security practices, risk management approach, and policies on our trust center.