Security & Compliance

Your Data Security
is Our Priority

We handle sensitive business data every day. Our security practices, policies, and infrastructure are designed to protect your information at every stage of engagement.

GDPR Compliant
CCPA Ready
SOC 2 Type II
In Progress
NDA with Every Client

Enterprise-grade encryption at every layer

ENCRYPTION

Data Encrypted at Rest & in Transit

All data is encrypted using AES-256 at rest and TLS 1.3 in transit. We never store client data on local devices or unencrypted media.

ISOLATION

Client Environment Separation

Each client's data environment is logically isolated. We work within your infrastructure — your cloud, your tools, your access controls.

PRIVACY

GDPR & CCPA Compliance

We follow data minimization principles, process only what's needed, and support data subject access requests. Ready for both EU and California requirements.

BACKUP

Regular Backups & Recovery

Automated daily backups with tested recovery procedures. Point-in-time recovery available for all managed data infrastructure.

Strict access management by default

Role-Based Access Control

Team members only access what they need. Permissions are scoped to specific projects and reviewed monthly.

Multi-Factor Authentication

MFA enforced on all accounts and tools. Hardware keys supported for critical infrastructure access.

Comprehensive Audit Logs

Every data access and modification is logged. Audit trails available for compliance reviews and incident investigation.

VPN & Secure Connections

All remote access through encrypted VPN tunnels. No client data traverses unsecured networks.

Built on secure, modern cloud infrastructure

CLOUD

SOC 2 Certified Cloud Providers

We deploy on AWS, GCP, and Azure — all SOC 2 Type II certified. Infrastructure is configured with security best practices: VPCs, security groups, and encrypted volumes.

MONITORING

24/7 Security Monitoring

Continuous monitoring for anomalies, unauthorized access attempts, and security events. Automated alerting with defined escalation procedures.

UPDATES

Regular Security Updates

Automated patching for critical vulnerabilities. Dependencies audited regularly. Infrastructure-as-code ensures consistent, reviewable deployments.

Meeting the standards your business requires

Active

GDPR

Full compliance with EU General Data Protection Regulation. Data Processing Agreements (DPA) executed with all clients handling EU data.

Active

CCPA

Ready for California Consumer Privacy Act requirements. Consumer data rights supported across all engagement workflows.

In Progress

SOC 2 Type II

Currently undergoing SOC 2 Type II audit for security, availability, and confidentiality trust service criteria. Expected completion Q3 2026.

Legal protection from day one

NDA

Standard NDA with Every Client

Non-disclosure agreements are signed before any data access. We're happy to sign your NDA or provide ours. Mutual confidentiality is non-negotiable.

INSURANCE

E&O Insurance Coverage

Professional liability (Errors & Omissions) insurance protects both parties. Coverage details available upon request during the contracting process.

DPA

Data Processing Agreements

For engagements involving personal data, we execute DPAs that specify data categories, processing purposes, sub-processors, and cross-border transfer safeguards.

IP

Clear IP Ownership

All work product created during your engagement belongs to you. No ambiguity, no hidden clauses. Your data, your models, your dashboards.

Clear policies for every stage of the data lifecycle

01

Onboarding

Access provisioned through your IAM. Minimum necessary permissions. All credentials stored in encrypted vaults.

02

During Engagement

Data stays in your environment. No client data on personal devices. Regular access reviews with your security team.

03

Offboarding

All access revoked within 24 hours. Local caches purged. Confirmation of secure deletion provided in writing.

04

Post-Engagement

Data retention per agreed schedule. Secure deletion upon request. No residual access to any client systems or data.

Ready to discuss
security requirements?

Every engagement starts with a mutual NDA. Let's talk about your specific compliance needs.

Book a Discovery Call →

or email nick@valiotti.com