Skip to main content

Trust centre

Plain answers about our security, privacy and legal posture.

Architected against OWASP ASVS and OWASP Top 10. Designed to support SOC 2 Type II, ISO 27001, ISO 27701 and HIPAA-ready deployments. Final certifications listed as they are achieved.

Security

Defence in depth, by default.

  • Argon2id password hashing
  • TOTP MFA with single-use recovery codes
  • OIDC SSO with encrypted client secrets
  • API keys (scoped, IP allow-listable, argon2id-hashed)
  • HMAC-signed webhooks with retry + replay protection
  • AES-256-GCM at rest with optional AWS KMS envelope encryption
  • SHA-256 hash-chained audit log
  • Login + MFA + API brute-force lockout
  • OWASP ASVS L2 and Top 10 reviewed
  • SAML 2.0 SSOroadmap
  • WebAuthn / FIDO2 hardware keys
  • SCIM 2.0 user provisioning
  • GCP KMS / Azure Key Vault providers
  • Annual third-party penetration testroadmap

Compliance

Built so we can certify, then certified.

SOC 2 Type II

Architected, on the roadmap

ISO 27001

Architected

ISO 27701

Architected

GDPR

Operational controls in place

HIPAA + BAA

Workflow + BAA template available

PCI DSS (payment fields)

Scoped, on the roadmap

CSA STAR

Self-assessment on the roadmap

eIDAS / ESIGN / UETA

Configurable per tenant

Privacy

Customer data is processed, not exploited.

We process customer documents and audit data solely to deliver the service. We do not sell customer data, and we do not use customer documents to train external AI models. Sub-processors are listed below.

  • Right to access and export
  • Right to deletion (subject to legal hold)
  • Configurable retention periods
  • Sub-processor change notifications
  • GDPR Data Processing Agreement available
  • Privacy dashboard for adminsroadmap
  • Cryptographic erasure on key rotationroadmap
  • PII detection and redaction toolingroadmap

Read the full Privacy Policy and Data Processing Agreement. Both are currently drafts pending counsel review.

Encryption

Strong defaults, customer-controlled keys.

In transit

TLS 1.2+ at the load balancer; HSTS recommended for production deployments.

At rest

AES-256-GCM via envelope encryption. Optional AWS KMS provider for KMS-wrapped DEKs.

Field-level

MFA secrets, OIDC client secrets and identity evidence encrypted with the same envelope before persistence.

Customer-managed keys

AWS KMS, GCP KMS and Azure Key Vault providers ship today. Bring your own key, rotate or revoke at any time.

Tamper-evidence

SHA-256 hash chain across every audit event, recomputable on demand from the compliance centre.

Trusted timestamping

TSA integration is on the roadmap; for now signing events are anchored to the audit chain.

Data residency

Choose where your documents live.

Available on Enterprise as a dedicated single-tenant deployment pinned to one of: Australia, United States, European Union, APAC. Backup region is selectable. Cross-region replication is opt-in.

Region selection is set at deployment time and cannot be changed without a documented migration. Standard multi-tenant plans run from our default region; talk to sales if data residency is a contractual requirement.

Sub-processors

Who we rely on, and why.

Sub-processorPurposeRegion
AWS / GCP / AzureCompute, storage, KMSSelectable per tenant
Postmark or AWS SESTransactional emailUS / EU
Datadog / SentryObservability and error trackingUS / EU
PersonaGovernment ID verification (add-on)Per signer jurisdiction
QTSP partner (roadmap)Qualified electronic signatures (eIDAS)EU

Incident response

Fast detection, faster disclosure.

Our incident response runbook follows a pager-first model. We commit to notifying affected customers within 72 hours of confirming a security incident impacting their data, with status updates every 24 hours until resolution and a written post-mortem within 14 days.

  • 24x7 on-call rotation
  • Pre-approved customer notification template
  • Hash-chained audit log preserved through incident
  • Tabletop exercises every six months
  • Forensic snapshot capability with documented chain of custody
  • Vulnerability disclosure programme published

Uptime + status

A public status page is on the way.

A public status page with historical uptime metrics will be published ahead of general availability. Uptime targets and any service credits are defined in customer master agreements rather than published here. Until the status page lands, customers can subscribe to incident notifications via the support channel in the agreement.

Penetration testing

External experts, every release cycle.

We are commissioning the first third-party penetration test ahead of public launch and will publish the summary letter (under NDA) once available. Subsequent tests are scheduled at least annually plus around significant releases, with remediation tracked in our internal backlog under severity-bound SLAs.

Business continuity

Backups, restores and DR drills.

Customer data is backed up with point-in-time recovery for at least 35 days. We run quarterly disaster recovery drills with documented RTO and RPO targets. Backup region is configurable per tenant.

Responsible AI

AI assists, never overrides.

  • AI does not modify documents without an explicit user action
  • AI outputs are clearly labelled as suggestions
  • AI does not provide legal advice
  • AI activity is recorded in the audit trail
  • Customer documents are not used to train external models
  • Enterprise admins can disable AI globally