Enterprise-grade security and data protection built for insurance and financial services
Industry-leading security standards and regulatory compliance
Annual SOC 2 Type II audit by independent third-party validates our security, availability, processing integrity, confidentiality, and privacy controls.
ISO 27001 certified. Information Security Management System (ISMS) implemented following ISO standards.
Full compliance with EU General Data Protection Regulation for data privacy and protection
California Consumer Privacy Act compliance for US data subject rights
Gramm-Leach-Bliley Act safeguards for financial services data protection
Multiple layers of security protect your sensitive data
Full control over where your data lives and how long we keep it
Choose where your data is stored and processed to meet regulatory requirements.
Data never leaves your chosen region. No cross-border transfers without explicit consent.
Configure retention periods to match your internal policies or regulatory requirements. Automated deletion after retention period expires.
Complete visibility and defensibility for every verification
Our audit trail capabilities support your compliance requirements for:
Complete documentation showing why claim was denied. Evidence supports SIU referrals and NICB submissions. Defensible in litigation.
Demonstrate compliance with state insurance regulations. Provide examiners with full audit trail showing fraud prevention measures.
Evidence packs include all data needed for National Insurance Crime Bureau fraud submissions and law enforcement referrals.
Track adjuster decisions and SIU escalations. Monitor false positive rates. Demonstrate fraud controls to board and auditors.
Everything your procurement and legal teams need
High-level security overview for executive review. Covers certifications, encryption, access controls, and incident response.
Request Document →Standard and customizable DPA templates. GDPR-compliant. Defines data handling, processing, and subprocessor terms.
Request Document →Technical architecture overview showing data flows, encryption points, network topology, and redundancy design.
Request Document →Full SOC 2 Type II report available under NDA. Includes auditor opinion, test results, and control descriptions.
Request Document →Detailed policy document covering retention periods, deletion procedures, and backup/recovery processes.
Request Document →Security incident response procedures, notification timelines, escalation paths, and customer communication protocols.
Request Document →Ensuring availability and resilience for mission-critical operations
We take security seriously—report issues responsibly
We appreciate responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to our security team.
Our security team is here to answer your procurement and compliance questions