Security & Compliance

Your data is safe with us.

We work with sensitive business data every day. Here's how we protect it—and what you can expect from us as a trusted partner.

Our Security Commitment

Security isn't a checkbox—it's foundational to how we work. As a consulting firm trusted with sensitive business data, we take the protection of your information seriously. Our practices are designed to meet the expectations of regulated industries and security-conscious organizations.

Data Protection & Handling

We follow the principle of data minimization: we only access the data necessary to complete your project. All client data is encrypted in transit (TLS 1.3) and at rest (AES-256). We do not train AI models on your proprietary data. Project data is retained only for the duration of the engagement plus a documented retention period, after which it is securely deleted.

  • Encryption in transit and at rest
  • Data minimization principles
  • No AI training on client data
  • Documented retention and deletion policies

Infrastructure Security

Our infrastructure runs on enterprise-grade cloud platforms (AWS, Azure, GCP) that maintain SOC 2 Type II, ISO 27001, and other industry certifications. We leverage their security controls for physical security, network isolation, and system hardening. Client workloads are isolated and access-controlled.

  • Enterprise cloud platforms with industry certifications
  • Network isolation and segmentation
  • Regular security updates and patching
  • Infrastructure as code with version control

Confidentiality & NDAs

We sign Non-Disclosure Agreements (NDAs) as a standard part of every engagement. Your business information, strategies, and data remain confidential. We do not share client names or project details in marketing materials without explicit written permission.

  • Standard NDA execution before project start
  • Strict confidentiality obligations
  • No disclosure without written consent
  • Secure handling of trade secrets

Access & Authentication

Access to client systems and data is granted on a least-privilege basis. We use multi-factor authentication (MFA) for all accounts, rotate credentials regularly, and revoke access immediately upon project completion or team changes.

  • Least-privilege access model
  • Multi-factor authentication required
  • Regular credential rotation
  • Immediate access revocation on project end

Personnel Security

All team members are vetted and trained on security best practices, data handling, and confidentiality obligations. We conduct regular security awareness training and maintain clear acceptable use policies.

  • Background checks for team members
  • Security awareness training
  • Clear acceptable use policies
  • Confidentiality agreements

Incident Response

We maintain an incident response plan to address potential security events quickly and transparently. In the unlikely event of a security incident affecting your data, we commit to prompt notification and full cooperation in remediation.

  • Documented incident response procedures
  • Prompt client notification
  • Root cause analysis
  • Remediation and prevention measures

Privacy & Data Rights

We respect individual privacy rights and comply with applicable privacy regulations, including GDPR for EU data subjects. We do not sell or share personal data with third parties for their own purposes. For details on how we handle personal information collected through our website, see our Privacy Policy.

Read our Privacy Policy

Compliance Alignment

While we are not currently SOC 2 certified, our practices are aligned with leading security frameworks including SOC 2 Trust Service Criteria, ISO 27001, and NIST Cybersecurity Framework. We continuously evaluate and improve our security posture as we grow. For clients requiring formal certifications, we are happy to discuss our roadmap and current controls in detail.

  • Practices aligned with SOC 2 Trust Service Criteria
  • Controls mapped to ISO 27001
  • NIST Cybersecurity Framework guidance
  • Continuous improvement process

Have security questions?

We're happy to discuss our security practices in detail, complete security questionnaires, or provide additional documentation for your procurement process.

CONTACT US

Last updated: January 2026