Brief content (your pitch text)
- Where
- Encrypted at rest
- Retention
- 30 days after report delivery
- Who sees it
- Owner only
What you submit is read, analyzed, and never recycled. Here is exactly what we do with your data, where it goes, and who handles it.
We are an early-stage company and do not yet hold a third-party security certification such as SOC 2 or ISO 27001. The practices below are self-attested. If you need a signed DPA, sub-processor list, or a security questionnaire response, email security@tryverdikt.app.
We list every third-party processor in our stack, including ones that haven't started receiving data yet. The status column tells you exactly which are live today. Updates go out 30 days before any new processor handles your data.
Each item below is either operating today or wired in code and waiting on the relevant launch. Where a practice activates only when its sub-processor goes live, it inherits that vendor's status from the table above. We update this page when any item changes.
Security researchers and customers can report a concern at any time. We acknowledge within one business day and ship a remediation timeline within 72 hours.
security@tryverdikt.app