Founded in 2025

|
|

Compliances

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001 v2022

In progress

Controls

Product security

Situational Awareness For Incidents

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security

Termination of Employment

Inventory of Infrastructure Assets

Testing for Reliability and Integrity

Network security

External System Connections

Transmission Confidentiality

Data used in Testing

App security

Conspicuous Link To Privacy Notice

Secure system modification

Endpoint security

Malicious Code Protection (Anti-Malware)

Endpoint Security Validation

Corporate security

Code of Business Conduct

Security & Privacy Awareness

Automated Reporting

Resources

Acceptable Usage Policy

Policy

Access Control Policy

Policy

Access Control Procedure

Policy

Asset Management Procedure

Policy

Asset Management Policy

Policy

Business Continuity & Disaster Recovery Policy

Policy

Subprocessors

Subprocessor Logo

Github Dependabot

Development software

Subprocessor Logo

Heroku

IT infrastructure

Subprocessor Logo

Auth0

Security Software

Subprocessor Logo

Checkr

Data Privacy

Subprocessor Logo

PostHog

Analytics

Subprocessor Logo

Github App

Development software