Trust Center

Security & Compliance

TokenPilot is built for enterprise teams where security and compliance are non-negotiable. This page documents our certifications, controls, and data handling practices.

Certifications & Compliance

SOC 2 Type II

Certified

TokenPilot undergoes annual SOC 2 Type II audits conducted by an independent third-party CPA firm. The audit covers Security, Availability, and Confidentiality trust service criteria.

Full report available to Enterprise customers under NDA. Contact sales@tokenpilot.fr to request access.

GDPR

Compliant

We process EU personal data lawfully. TokenPilot maintains Data Processing Agreements (DPAs) and supports the right to erasure, data portability, and breach notification within 72 hours.

EU customers can request a DPA at privacy@tokenpilot.fr. EU data residency available on Enterprise plans.

CCPA

Compliant

California Consumer Privacy Act requirements are fully addressed. We support the right to know, delete, and opt-out of the sale of personal information.

California residents can submit CCPA requests via privacy@tokenpilot.fr.

Data Residency

EU & US regions

Enterprise customers can choose their data residency region: EU (Frankfurt, Germany) or US (Virginia, USA). All data — prompts, keys, logs — stays in the selected region.

Region selection is available at workspace creation. Migration between regions available on request.

Security Controls

Encryption at Rest

All data encrypted with AES-256-GCM. API keys are stored using envelope encryption with workspace-specific keys.

Encryption in Transit

All connections enforced over TLS 1.3. HSTS preloading enabled. Certificate transparency monitoring active.

Infrastructure Security

Hosted on SOC 2 certified cloud infrastructure. Network segmentation, WAF, and DDoS protection active at all times.

Access Control

RBAC enforced at workspace level. SSO/SAML available for Enterprise. MFA required for admin accounts. Audit logs immutable.

Vulnerability Management

Annual third-party penetration testing. Bug bounty program active. CVE monitoring and 30-day remediation SLA.

Incident Response

Documented IRP with defined RTO/RPO. Customers notified within 72 hours of a confirmed breach. Post-mortems published.

Sub-processors

We maintain a list of authorized sub-processors. Enterprise customers are notified of changes with 30 days' notice.

VendorPurposeData location
SupabaseDatabase & AuthUS / EU
StripePayment processingUS / EU
VercelCompute & CDNUS / EU (region-pinned)
OpenAILLM inference (optional)US
AnthropicLLM inference (optional)US

Have a security question?

Our security team responds to all inquiries within one business day. Enterprise customers get a dedicated security contact.