We protect customer data with encryption, strict access controls, AI governance designed for restoration and franchise networks, and a public SOC 2 roadmap.
We are not SOC 2 certified today. We are actively preparing for SOC 2 Type I within 6 months and have already implemented the core controls. Read the full roadmap below.
These practices are operating now. They form the foundation for our SOC 2 audit work and any enterprise vendor review.
We publish our roadmap because honesty about timing is more useful to vendor reviewers than a vague claim. Here is exactly where we are.
Encryption, RLS, audit logging, RBAC, and AI governance practices align with SOC 2 Common Criteria. We have not yet completed a formal audit.
Wire automated evidence collection (audit log, RBAC, encryption signals, vendor inventory). Complete vendor security questionnaires for prospective customers.
Engage a third-party auditor (e.g., Prescient Assurance, Schellman, or Barr Advisory) for the Type I attestation.
Complete the 12-month observation window and Type II attestation. Make report available to enterprise customers under NDA.
Third-party penetration test annually. GDPR / CCPA-compliant DPA available for any customer on request.
We notify customers at least 30 days in advance of adding a new subprocessor that processes customer data. Email security@expertailabs.ai to receive change notifications.
| Subprocessor | Purpose | Location | Compliance |
|---|---|---|---|
Vercel, Inc. | Application hosting, serverless compute, edge network, build pipeline | United States | SOC 2 Type II ISO 27001 GDPR |
Supabase, Inc. | Primary database, authentication, file storage, row-level security | United States (us-east-1) | SOC 2 Type II HIPAA-eligible plan available |
Anthropic, PBC | Large language model inference for content generation, classification, summarization We use Anthropic's zero-retention configuration. Tenant data is not used to train models. | United States | SOC 2 Type II Zero data retention API tier |
OpenAI, L.L.C. | Large language model inference, audio transcription (Whisper), embeddings, vision We use OpenAI's API zero-retention configuration where supported. Tenant data is not used to train models. | United States | SOC 2 Type II Zero data retention API tier |
Resend, Inc. | Transactional email delivery, deliverability monitoring, webhook event stream | United States | SOC 2 Type II |
Twilio, Inc. | SMS, voice, programmable messaging for lead-intake callback flows | United States | SOC 2 Type II ISO 27001 HIPAA-eligible |
CallRail, LLC | Inbound call tracking, recording, transcription source | United States | SOC 2 Type II PCI DSS |
Google LLC (Workspace, Ads, Maps Platform) | Email infrastructure (Workspace), conversion event reporting (Ads), business listing data (Maps), reCAPTCHA | United States | SOC 2 Type II ISO 27001 ISO 27017 ISO 27018 |
SemRush Inc. | SEO research, keyword ranking, competitive analysis | United States | SOC 2 Type II |
HeyGen Labs, Inc. | AI video generation from text scripts (per-franchise avatar configured manually) | United States | SOC 2 Type II |
Cloudflare, Inc. | DNS, CDN, DDoS protection, bot management for public marketing surface | Global edge | SOC 2 Type II ISO 27001 PCI DSS |
We commit to 24-hour breach notification from the moment a security incident affecting customer data is confirmed.
Our incident response runbook covers: detection, containment, customer notification, regulator notification (where required), root-cause analysis, and post-incident review with corrective actions.
Customers receive a written incident report within 14 days of containment, with redactions only where legally required.
Report a security incidentWe welcome reports from security researchers and offer safe-harbor for good-faith research.
We respond to security questionnaires within 5 business days. DPA available on request. Penetration test results and SOC 2 evidence shared under NDA once reports are issued.