Security & Compliance | Soft Pull Solutions Skip to main content

Our commitment to security and compliance

We take the protection of sensitive consumer and business information seriously. This page provides a high-level overview of the safeguards and compliance practices we maintain, and explains how prospective clients can request additional documentation as part of their due diligence process.

Security at a glance

  • Encryption and secure transmission of data
  • Role-based access control and least-privilege principles

  • Logging and audit trails for sensitive actions

  • Secure software development and change management practices

*Note: This overview is not a policy document. Detailed policies and supporting materials are available upon request under a mutual non-disclosure agreement.

Key Safeguards

Encryption

  • Data transmitted using industry-standard secure protocols

  • Secure storage practices appropriate to the data type

Authentication & access control

  • Role-based access control (RBAC)

  • Strong authentication requirements

  • Administrative access restricted to authorized personnel

Logging & monitoring

  • Audit logging for sensitive operations

  • Monitoring and alerting for anomalous activity

Secure development

  • Change management and code review processes

  • Separation of development, testing, and production environments

Incident response & continuity

  • Documented incident response procedures

  • Backup and recovery practices

  • Business continuity planning

If you'd like to request specific documents. Please fill out the NDA below:

 

Back to top