Trust & Security
Security & Compliance
Enterprise-grade security infrastructure designed to protect sensitive identity data and meet the most stringent compliance requirements.
SOC 2 Type II (On Roadmap)
Controls designed to meet all five Trust Service Criteria. We are actively pursuing SOC 2 Type II certification.
GDPR Compliant
Full compliance with EU General Data Protection Regulation. Standard Contractual Clauses (SCCs) available for international transfers.
NIST 800-53 Aligned
Security and privacy controls aligned to NIST SP 800-53 Rev. 5 control families including AC, AU, IA, IR, SC, and SI.
SOX-Compliant Audit Trails
Immutable, tamper-evident audit logs meeting Sarbanes-Oxley record retention requirements for financial institutions.
Data Security
Encryption
- At Rest: AES-256 encryption for all stored data including biometric images, documents, and personal information
- In Transit: TLS 1.3 encryption for all network communications
- Key Management: Google Cloud KMS with automatic key rotation and hardware security modules (HSMs)
- Encryption Lifecycle: Cryptographic erasure ensures deleted data is unrecoverable
Access Controls
- Zero Trust Architecture: Every request is authenticated and authorized
- Role-Based Access Control (RBAC): Principle of least privilege for all user and system access
- Multi-Factor Authentication (MFA): Required for all administrative access
- Session Management: Automatic timeout and session invalidation
- API Security: OAuth 2.0, JWT tokens, rate limiting, and IP whitelisting
Infrastructure Security
- Cloud Provider: Google Cloud Platform (SOC 2/3, ISO 27001, PCI DSS Level 1)
- Network Isolation: VPC isolation, private subnets, and firewall rules
- DDoS Protection: Google Cloud Armor for distributed denial-of-service mitigation
- Container Security: Cloud Run with automatic patching and vulnerability scanning
- Secrets Management: Google Secret Manager for credential storage
Compliance Framework
SOC 2 Type II (On Roadmap)
We are actively pursuing SOC 2 Type II certification. All controls are designed to meet the following Trust Service Criteria:
- Security: Protection against unauthorized access (physical and logical)
- Availability: 99.9% uptime target with redundancy and disaster recovery
- Confidentiality: Sensitive data is protected from unauthorized disclosure
- Processing Integrity: System processing is complete, valid, accurate, timely, and authorized
- Privacy: Personal information is collected, used, retained, and disclosed in conformity with commitments
NIST 800-53 Alignment
Our security program aligns with NIST SP 800-53 Rev. 5 control families:
- Access Control (AC): RBAC, least privilege, session management, MFA
- Audit & Accountability (AU): Immutable audit logs, automated review, tamper-evident records
- Identification & Authentication (IA): Strong authentication, SSO/SAML support
- Incident Response (IR): Documented response plan, 24-hour notification SLA
- System & Communications Protection (SC): TLS 1.3, AES-256, validated cryptographic modules
- System & Information Integrity (SI): Vulnerability scanning, patch management, anomaly detection
GDPR Compliance
Our GDPR compliance program includes:
- Legal Basis: Consent, legitimate interests, legal obligation, and contract performance
- Data Minimization: Collect only necessary data for identity verification
- Privacy by Design: Security and privacy built into every system component
- Data Subject Rights: Automated processes for access, rectification, erasure, and portability requests
- Data Protection Officer (DPO): Dedicated DPO for privacy oversight
- Data Transfer: Standard Contractual Clauses (SCCs) for international transfers
- Breach Notification: 72-hour breach notification process
SOX Compliance
For financial institutions and public companies, we provide:
- Immutable Audit Trails: Tamper-proof logging of all verification events
- 7-Year Retention: Compliance with record retention requirements
- Internal Controls: Segregation of duties and change management processes
- Audit Reports: Detailed verification logs for internal and external auditors
- Attestation: Management certification of controls effectiveness
CCPA & US State Privacy Laws
- California (CCPA/CPRA): Consumer rights for access, deletion, and opt-out
- Virginia (VCDPA): Comprehensive data protection rights
- Colorado (CPA): Data privacy requirements
- Biometric Laws: Illinois BIPA, Texas CUBI, Washington HB 1493 compliance
Industry Alignment
- NIST CSF: Cybersecurity Framework alignment across Identify, Protect, Detect, Respond, Recover
- FedRAMP-Ready: Architecture designed to support FedRAMP authorization if required
- HIPAA: Business Associate Agreement (BAA) available for healthcare customers
Security Monitoring
24/7 Monitoring & Response
- SIEM: Security Information and Event Management for real-time threat detection
- Intrusion Detection: Network and host-based IDS/IPS
- Log Aggregation: Centralized logging with Google Cloud Logging
- Anomaly Detection: Machine learning-based behavior analysis
- Incident Response: 24/7 security operations center (SOC)
Vulnerability Management
- Continuous Scanning: Automated vulnerability scanning of infrastructure and applications
- Patch Management: Automated security patches within 48 hours of release
- Penetration Testing: Annual third-party penetration tests and red team exercises
- Bug Bounty: Responsible disclosure program (coming soon)
- Dependency Scanning: Automated scanning of third-party libraries (Dependabot, Snyk)
Incident Response
Our incident response plan includes:
- Detection: Automated alerting and 24/7 monitoring
- Containment: Immediate isolation of affected systems
- Investigation: Forensic analysis and root cause determination
- Remediation: Patching, configuration changes, and security improvements
- Notification: Customer notification within 24 hours of confirmed breach
- Post-Mortem: Documented lessons learned and process improvements
Data Privacy
Data Handling Practices
- Data Minimization: Collect only what's necessary for identity verification
- Purpose Limitation: Data used only for stated purposes
- Storage Limitation: Automatic deletion after retention period expires
- Anonymization: Machine learning training uses anonymized data only
- No Sale: We never sell, lease, or trade personal data
Biometric Data Protection
- Explicit Consent: Written consent required before collecting biometric data
- Specialized Encryption: Biometric templates stored with enhanced encryption
- Limited Access: Biometric data accessible only to authorized ML systems
- Retention Policy: Biometric data automatically purged within 24 hours of verification completion
- State Law Compliance: BIPA (Illinois), CUBI (Texas), Washington HB 1493
Third-Party Vendors
All third-party vendors undergo:
- Security Assessment: Vendor security questionnaires and audits
- Data Processing Agreements: GDPR-compliant DPAs with all processors
- Access Controls: Limited, audited access to customer data
- Regular Reviews: Annual vendor security reassessment
Business Continuity
High Availability
- Uptime SLA: 99.9% availability guarantee
- Multi-Region: Redundant infrastructure across multiple GCP regions
- Auto-Scaling: Automatic scaling to handle traffic spikes
- Load Balancing: Global load balancer with health checks
Disaster Recovery
- Backup Schedule: Hourly incremental, daily full backups
- Backup Retention: 30-day backup retention with point-in-time recovery
- Geographic Redundancy: Backups stored in multiple regions
- Recovery Time Objective (RTO): 4 hours
- Recovery Point Objective (RPO): 1 hour
- DR Testing: Quarterly disaster recovery drills
Employee Security
Background Checks
- All Employees: Criminal background checks and identity verification (using IDChecker AI!)
- Enhanced Screening: Additional screening for employees with data access
- Ongoing Monitoring: Continuous background monitoring for security-sensitive roles
Security Training
- Onboarding: Security and privacy training for all new hires
- Annual Training: Mandatory annual security awareness training
- Specialized Training: Role-specific training (developers, security team, support)
- Phishing Simulations: Quarterly phishing tests and remedial training
Access Management
- Least Privilege: Employees have minimum access required for their role
- Quarterly Reviews: Access rights reviewed and recertified quarterly
- Offboarding: Immediate access revocation upon termination
Responsible AI
Ethical AI Principles
- Bias Testing: Regular testing for demographic bias in face matching algorithms
- Transparency: Clear documentation of AI decision-making processes
- Human Oversight: Human review available for disputed verifications
- Explainability: Audit logs explain verification decisions
Model Security
- Adversarial Testing: Testing against deepfakes and presentation attacks
- Model Versioning: All models versioned and auditable
- Training Data: Anonymized, diverse datasets with consent
Security Questions?
Our security team is available to answer your questions and provide additional documentation.
Security Team: security@idchecker.ai
Privacy Team: privacy@idchecker.ai
Report Security Issue: security@idchecker.ai (PGP key available)