EnrichlyAI

Data Security

Enterprise-grade security protecting your business data at every layer

Last Updated: January 27, 2026

๐Ÿ”’ 256-bit Encryption
โ˜๏ธ Google Cloud Platform
โœ“ SOC 2 Type II
๐Ÿ›ก๏ธ GDPR Compliant

Table of Contents

1. Our Security Commitment

At EnrichlyAI, security is not an afterthoughtโ€”it's the foundation of everything we build. We understand that you trust us with sensitive business data, and we take that responsibility seriously.

Our Promise: We employ industry-leading security practices, maintain rigorous compliance standards, and continuously invest in protecting your data. Security is embedded in our culture, our processes, and our technology stack.

Our multi-layered security approach includes:

We recognize that security is a shared responsibility. This page provides comprehensive information about our security measures and guidance on how you can protect your account and data.

2. Data Encryption

We use military-grade encryption to protect your data both in transit and at rest, ensuring that your sensitive business information remains confidential and secure.

2.1 Encryption in Transit

All data transmitted between your device and our servers is protected using:

Technical Details: We use TLS 1.3 with ECDHE_RSA key exchange, AES_256_GCM cipher, and SHA384 MAC algorithm. We disable all legacy protocols (SSL, TLS 1.0, TLS 1.1) and weak cipher suites.

2.2 Encryption at Rest

All data stored in our systems is encrypted using:

2.3 Application-Level Encryption

Beyond infrastructure encryption, we implement additional protection:

3. Infrastructure Security

EnrichlyAI's infrastructure is built on Google Cloud Platform (GCP), leveraging world-class security controls and best practices.

3.1 Google Cloud Platform Security

We benefit from Google's comprehensive security infrastructure:

3.2 Network Security

Our network architecture implements defense in depth:

๐Ÿ”ฅ Firewall Protection

Virtual Private Cloud (VPC) with strict firewall rules. Only necessary ports exposed, all others blocked by default.

๐Ÿšซ DDoS Protection

Google Cloud Armor provides automatic DDoS mitigation, blocking malicious traffic before it reaches our systems.

๐Ÿ” Intrusion Detection

Cloud IDS monitors network traffic for suspicious activity and known attack patterns in real-time.

๐Ÿ›ก๏ธ Web Application Firewall

WAF rules protect against OWASP Top 10 vulnerabilities including SQL injection and XSS attacks.

๐Ÿ” Private Networking

Backend services communicate over private networks, never exposed to the public internet.

๐Ÿ“Š Traffic Analysis

Advanced analytics detect anomalous patterns, rate limiting prevents abuse, and geo-blocking available.

3.3 Application Security

Our application architecture follows security best practices:

3.4 Database Security

4. Access Controls and Authentication

We implement strict access controls to ensure only authorized individuals can access systems and data.

4.1 User Authentication

4.2 Role-Based Access Control (RBAC)

Fine-grained permissions control what users can access:

Role Permissions Use Case
Admin Full account access, user management, billing Account owners and administrators
Manager Create/edit searches, export data, view reports Team leads and project managers
Member View searches, limited export capabilities Standard team members
Viewer Read-only access to shared searches Stakeholders and reviewers

4.3 Employee Access Controls

Strict controls govern employee access to customer data:

4.4 API Security

5. Security Monitoring and Incident Response

Our Security Operations Center (SOC) maintains constant vigilance over our systems and data.

5.1 Security Monitoring

5.2 Incident Response

We maintain a comprehensive incident response program:

Response Time Commitment: Our incident response team is alerted within 5 minutes of any security event and begins investigation within 15 minutes. Critical incidents receive immediate executive attention.

Our incident response process:

  1. Detection: Automated systems and manual reviews identify potential incidents
  2. Triage: Incident severity assessed and response team assembled
  3. Containment: Affected systems isolated to prevent spread
  4. Investigation: Root cause analysis and scope determination
  5. Remediation: Threat eliminated and systems restored
  6. Communication: Affected customers notified per legal requirements
  7. Post-Mortem: Lessons learned and improvements implemented

5.3 Incident Communication

We commit to transparent communication:

5.4 Logging and Auditing

6. Compliance and Certifications

EnrichlyAI maintains rigorous compliance with industry standards and regulations to protect your data and meet legal requirements.

โœ“

SOC 2 Type II

Security, availability, and confidentiality controls

Certified
๐Ÿ”’

GDPR

EU General Data Protection Regulation compliance

Compliant
๐Ÿ‡บ๐Ÿ‡ธ

CCPA

California Consumer Privacy Act compliance

Compliant
๐ŸŒ

ISO 27001

Information security management certification

In Progress
๐Ÿฅ

HIPAA

Healthcare data protection standards

In Progress
๐Ÿ’ณ

PCI DSS

Payment card industry data security

Level 1

6.1 SOC 2 Type II Certification

We have successfully completed SOC 2 Type II audits, demonstrating our commitment to:

SOC 2 reports available to enterprise customers under NDA upon request.

6.2 GDPR Compliance

For our European customers, we ensure full compliance with GDPR:

6.3 CCPA Compliance

California residents have specific rights under CCPA:

6.4 Industry-Specific Compliance

Additional compliance frameworks in progress:

7. Third-Party Security

We carefully vet all third-party services and maintain strict security requirements for our vendors.

7.1 Vendor Security Assessment

All third-party vendors undergo rigorous security evaluation:

7.2 Third-Party Services We Use

Service Purpose Security Certification
Google Cloud Platform Infrastructure and hosting SOC 2, ISO 27001, PCI DSS
Google Places API Business data enrichment Google security standards
Stripe Payment processing PCI DSS Level 1, SOC 2
SendGrid Transactional email SOC 2 Type II
Auth0 Authentication services SOC 2, ISO 27001, GDPR
Cloudflare CDN and DDoS protection SOC 2, ISO 27001

7.3 Subprocessor Management

7.4 API and Integration Security

For integrations and APIs we connect to:

8. Data Backup and Recovery

We maintain comprehensive backup and disaster recovery procedures to ensure your data is never lost.

8.1 Backup Strategy

8.2 Disaster Recovery

Our disaster recovery plan ensures business continuity:

8.3 High Availability Architecture

8.4 Data Retention and Deletion

9. Vulnerability Management

We proactively identify and remediate security vulnerabilities through comprehensive testing and monitoring programs.

9.1 Security Testing

9.2 Vulnerability Remediation

Timely remediation based on severity:

Severity Definition Remediation Time
Critical Remote code execution, data breach risk 24 hours
High Authentication bypass, privilege escalation 7 days
Medium Information disclosure, CSRF 30 days
Low Minor information leakage 90 days

9.3 Security Development Lifecycle

Security integrated into every phase of development:

9.4 Patch Management

10. Employee Security Training

Our employees are our first line of defense. We invest heavily in security awareness and training.

10.1 Security Training Program

10.2 Training Topics

10.3 Security Culture

Building a security-first culture:

10.4 Vendor and Contractor Training

11. Reporting Security Issues

We welcome reports from security researchers and users who discover potential vulnerabilities.

๐Ÿšจ Report a Security Vulnerability

If you've discovered a security vulnerability, please report it to us immediately:

Email: security@enrichly.ai

PGP Key: Available at enrichly.ai/pgp-key.txt

Please include:

  • Description of the vulnerability and potential impact
  • Steps to reproduce the issue
  • Any proof-of-concept code or screenshots
  • Your contact information for follow-up
  • Whether you'd like acknowledgment in our Hall of Fame

11.1 Responsible Disclosure Policy

We follow coordinated vulnerability disclosure:

11.2 Bug Bounty Program

Bug Bounty: We offer rewards for valid security vulnerabilities. Critical vulnerabilities can earn up to $10,000. Visit enrichly.ai/security/bug-bounty for details.

Bounty amounts based on severity and impact:

11.3 Security Researcher Guidelines

We ask security researchers to:

11.4 Safe Harbor

We will not pursue legal action against security researchers who:

11.5 Scope

In scope for bug bounty:

Out of scope:

12. Security Best Practices for Users

Security is a shared responsibility. Here are best practices to keep your account secure.

12.1 Account Security

๐Ÿ”‘ Strong Passwords

Use unique passwords with 12+ characters. Use a password manager like 1Password or LastPass.

๐Ÿ” Enable MFA

Turn on multi-factor authentication using an authenticator app (Authy, Google Authenticator).

๐Ÿšซ Avoid Password Reuse

Never reuse passwords across services. One breach can compromise all accounts.

๐Ÿ‘๏ธ Review Sessions

Regularly check active sessions in settings. Revoke unfamiliar devices immediately.

๐Ÿ”„ Regular Password Updates

Change passwords every 90 days, especially for admin accounts.

๐Ÿ“ง Verify Login Alerts

Pay attention to login notification emails. Report suspicious logins immediately.

12.2 Data Protection

12.3 Phishing Awareness

Warning: EnrichlyAI will NEVER ask for your password via email, phone, or chat. Always verify the sender before clicking links in emails.

Red flags to watch for:

12.4 Device Security

12.5 Team Security

12.6 Compliance Considerations

If you're subject to specific regulations:

Questions About Security?

Our security team is here to help answer your questions and address concerns.

Security Team: security@enrichly.ai

Privacy Questions: privacy@enrichly.ai

Compliance Inquiries: compliance@enrichly.ai

Privacy Policy | Terms of Service | Contact Us | Help Center