Security & Compliance
TokenPilot is built for enterprise teams where security and compliance are non-negotiable. This page documents our certifications, controls, and data handling practices.
Certifications & Compliance
SOC 2 Type II
CertifiedTokenPilot undergoes annual SOC 2 Type II audits conducted by an independent third-party CPA firm. The audit covers Security, Availability, and Confidentiality trust service criteria.
Full report available to Enterprise customers under NDA. Contact sales@tokenpilot.fr to request access.
GDPR
CompliantWe process EU personal data lawfully. TokenPilot maintains Data Processing Agreements (DPAs) and supports the right to erasure, data portability, and breach notification within 72 hours.
EU customers can request a DPA at privacy@tokenpilot.fr. EU data residency available on Enterprise plans.
CCPA
CompliantCalifornia Consumer Privacy Act requirements are fully addressed. We support the right to know, delete, and opt-out of the sale of personal information.
California residents can submit CCPA requests via privacy@tokenpilot.fr.
Data Residency
EU & US regionsEnterprise customers can choose their data residency region: EU (Frankfurt, Germany) or US (Virginia, USA). All data — prompts, keys, logs — stays in the selected region.
Region selection is available at workspace creation. Migration between regions available on request.
Security Controls
Encryption at Rest
All data encrypted with AES-256-GCM. API keys are stored using envelope encryption with workspace-specific keys.
Encryption in Transit
All connections enforced over TLS 1.3. HSTS preloading enabled. Certificate transparency monitoring active.
Infrastructure Security
Hosted on SOC 2 certified cloud infrastructure. Network segmentation, WAF, and DDoS protection active at all times.
Access Control
RBAC enforced at workspace level. SSO/SAML available for Enterprise. MFA required for admin accounts. Audit logs immutable.
Vulnerability Management
Annual third-party penetration testing. Bug bounty program active. CVE monitoring and 30-day remediation SLA.
Incident Response
Documented IRP with defined RTO/RPO. Customers notified within 72 hours of a confirmed breach. Post-mortems published.
Sub-processors
We maintain a list of authorized sub-processors. Enterprise customers are notified of changes with 30 days' notice.
| Vendor | Purpose | Data location |
|---|---|---|
| Supabase | Database & Auth | US / EU |
| Stripe | Payment processing | US / EU |
| Vercel | Compute & CDN | US / EU (region-pinned) |
| OpenAI | LLM inference (optional) | US |
| Anthropic | LLM inference (optional) | US |
Have a security question?
Our security team responds to all inquiries within one business day. Enterprise customers get a dedicated security contact.