Back to Home

Security

How we protect your data

At Zduhac, security is foundational to everything we build. We handle sensitive emergency call data and take our responsibility to protect it seriously. This page outlines our security practices and commitments.

End-to-End Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256)

SOC 2 Compliant Infrastructure

Hosted on providers with SOC 2 Type II certification

24/7 Monitoring

Continuous security monitoring and threat detection

Access Controls

Role-based access control and principle of least privilege

Data Encryption

We employ industry-standard encryption to protect your data at every stage:

  • In Transit: All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest and most secure transport layer protocol.
  • At Rest: All stored data, including call recordings, transcripts, and customer information, is encrypted using AES-256 encryption.
  • Key Management: Encryption keys are managed using secure key management services with automatic rotation.

Infrastructure Security

Our infrastructure is built on enterprise-grade cloud providers with robust security certifications:

  • Supabase: Our database provider is SOC 2 Type II certified, with data centers in secure facilities with physical access controls, 24/7 surveillance, and environmental protections.
  • Vercel: Our application hosting is SOC 2 Type II certified with a global edge network and DDoS protection.
  • Vapi & Twilio: Our telephony partners maintain SOC 2 compliance and PCI DSS certification for payment card handling.
  • Stripe: Payment processing is PCI DSS Level 1 certified, the highest level of certification available.

Access Control

We implement strict access controls to ensure only authorized personnel can access sensitive data:

  • Role-Based Access: Employees have access only to the systems and data necessary for their job functions.
  • Multi-Factor Authentication: All internal systems require MFA for access. We strongly recommend customers enable MFA on their accounts.
  • Access Logging: All access to customer data is logged and auditable.
  • Regular Access Reviews: We conduct quarterly reviews of access permissions to ensure appropriateness.

Monitoring & Detection

We maintain comprehensive monitoring to detect and respond to security threats:

  • Real-Time Monitoring: 24/7 automated monitoring of our systems for security anomalies and threats.
  • Intrusion Detection: Advanced intrusion detection systems to identify unauthorized access attempts.
  • Vulnerability Scanning: Regular automated scanning for known vulnerabilities.
  • Log Analysis: Centralized logging with automated analysis for suspicious patterns.

Compliance & Certifications

We maintain compliance with industry standards and are working toward additional certifications:

SOC 2 Type II

Infrastructure providers certified

PCI DSS

Payment processing compliant via Stripe

GDPR Ready

EU data protection compliance

CCPA Compliant

California privacy rights supported

Incident Response

We have documented procedures for responding to security incidents:

  • Response Team: Dedicated security personnel with defined roles and responsibilities for incident handling.
  • Notification: We will notify affected customers of security incidents within 72 hours of confirmation, in accordance with applicable laws.
  • Post-Incident Review: All incidents are reviewed to identify root causes and implement preventive measures.

Vulnerability Disclosure

We welcome responsible disclosure of security vulnerabilities. If you discover a security issue:

How to Report

  • Email us at security@zduhac.com
  • Include detailed information about the vulnerability
  • Allow us reasonable time to address the issue before public disclosure
  • We will acknowledge receipt within 48 hours

Security Contact

For security-related questions or concerns, please contact our security team:

Email: security@zduhac.com

For urgent security matters: security-urgent@zduhac.com

Your Security is Our Priority

We continuously invest in security measures to protect your data. If you have questions about our security practices, please don't hesitate to reach out.