Veriga

Security Policy

Last updated: May 23, 2024

Our Commitment to Security

At Veriga, we take the security of your data seriously. We understand that you entrust us with sensitive contract information, and we are committed to implementing and maintaining robust security measures to protect that information.

Encryption

All data is encrypted in transit and at rest using industry-standard encryption protocols.

Access Controls

Strict access controls limit who can access your data, with regular auditing of access patterns.

Secure Infrastructure

Our systems are hosted in secure, SOC 2 compliant facilities with 24/7 monitoring.

Regular Audits

We conduct regular security audits and penetration testing to identify and address vulnerabilities.

Data Protection

We implement multiple layers of security to protect your contract data throughout its lifecycle in our system:

Contract Upload & Storage

  • All contracts are encrypted immediately upon upload.
  • Contracts are stored in secure, isolated environments.
  • Access to stored contracts is strictly limited and logged.

Processing & Analysis

  • Contract analysis occurs in isolated, secure processing environments.
  • Our AI models are designed to process data securely without retaining sensitive information.
  • We implement data minimization principles to limit data exposure.

Data Retention

We only retain your data for as long as necessary to provide our services or as required by applicable laws. You can request deletion of your data at any time.

Security Practices

Regular Security Updates

We regularly update our systems and software to address security vulnerabilities. Our team follows industry best practices for patch management to ensure timely application of critical security updates.

Continuous Monitoring

Our security team continuously monitors our systems for suspicious activities and potential security threats. We have automated alerts and response procedures in place for quick mitigation of identified issues.

Security Measures for Users

We recommend that all users follow these security best practices:

  • Use strong, unique passwords for your Veriga account.
  • Enable two-factor authentication when available.
  • Keep your login credentials confidential.
  • Log out from your account when using shared devices.
  • Regularly review your account activity for any unusual behavior.

Security Updates

We are committed to continuously improving our security measures. As security technologies and best practices evolve, we update our systems and procedures accordingly.

Reporting Security Concerns

If you discover a security vulnerability or have a security concern about our services, please contact us immediately at hello@veriga.app. We appreciate your help in keeping Veriga secure.