Security & Compliance

Trust Center

Security, Compliance, and Audit Documentation

We take security seriously. Learn about our security practices, compliance certifications, and access documentation for your security reviews.

Compliance & Certifications

SOC 2 Type II

Independently audited controls for security, availability, and confidentiality.

Certified

ISO 27001

Platform designed and operated in alignment with ISO 27001 standards.

Compliant

PCI DSS

Architecture designed to meet PCI data security standards.

Compliant

GDPR & CCPA

Compliant with EU and California data protection regulations.

Compliant

Security Architecture

Zero Data Retention

Customer data is never stored -transmitted directly to your systems for a zero-liability posture.

End-to-End Encryption

AES-256 encryption at rest, SSL/TLS in transit. BYOK support for your own key management.

Role-Based Access Control

Granular RBAC permissioning, 2FA, strict password policies, and SSO integration.

Tenant Isolation

Built-in multi-tenancy with complete data isolation and tenant-scoped access controls.

Audit & Monitoring

Real-Time Monitoring

Behavioral analysis, anomaly detection, and intrusion detection across all integrations.

Immutable Audit Logs

Tamper-evident tracking of all API requests, webhook events, and integration activities.

Credential Management

Bring Your Own Key Store (BYOK) or use Unizo's secure vault with token lifecycle management.

Incident Response & Breach Notification

Unizo maintains a documented incident response plan. In the event of a personal data breach:

  • We will notify affected customers within 72 hours of confirmed awareness, as required by GDPR Article 33
  • Notifications will include the nature of the breach, categories and approximate number of data subjects affected, likely consequences, and measures taken to address the breach
  • Customers will be provided with sufficient information to fulfill their own notification obligations to supervisory authorities and data subjects

For security incidents, contact [email protected]

Available Documentation

Request access to our security documentation for your vendor review.

SOC 2 Type II Report
Penetration Test Summary
Security Whitepaper
Data Processing Agreement
Incident Response Plan

Need Security Documentation?

Request our security package for your vendor assessment.

Security inquiries: [email protected] | Privacy inquiries: [email protected]