About Divisions Products Security Client Portal Contact
All Systems Operational

Security
& Trust

Your data is your most valuable asset. We protect it with enterprise-grade encryption, Canadian data residency, and zero third-party sharing — because trust isn't marketed, it's engineered.

🔒
AES-256 Encryption
🇨🇦
Canadian Data Residency
🛡️
SOC 2 Aligned
🚫
Zero Data Sharing

Foundation

Six Pillars of Protection

Enterprise-grade security isn't a feature — it's the architecture. Every layer is built with defense in depth.

🔐

Encryption Everywhere

AES-256 encryption at rest. TLS 1.2+ for every byte in transit. Your data is unreadable without authorization — period.

🏔️

Canadian Sovereignty

All data is stored and processed within Canada. No cross-border transfers without explicit written consent. Your data stays home.

👁️

Access Control

Role-based access with principle of least privilege. Multi-factor authentication for all administrative access. Need-to-know only.

🔍

Continuous Monitoring

Real-time security monitoring, intrusion detection, and 90-day log retention. Threats are detected before they become incidents.

💾

Encrypted Backups

Automated encrypted backups with tested restoration procedures. Business continuity is guaranteed — even in worst-case scenarios.

🚨

Incident Response

Documented incident response procedures with 72-hour breach notification. If something happens, you know within hours — not weeks.


Compliance

Built for Regulatory Reality

We don't just meet compliance requirements — we exceed them. Every framework is implemented with industry best practices.

PIPA

Compliant

Full compliance with Alberta's Personal Information Protection Act (S.A. 2003, c. P-6.5). All data handling follows PIPA requirements for collection, use, and disclosure of personal information.

PIPEDA

Compliant

Federal Personal Information Protection and Electronic Documents Act compliance for inter-provincial and cross-border data handling. 10 fair information principles implemented.

SOC 2 Type II

Aligned

Security controls aligned with SOC 2 Trust Service Criteria — security, availability, processing integrity, confidentiality, and privacy. Formal certification in roadmap.

Data Processing

DPA Ready

Comprehensive Data Processing Agreements for every enterprise client. Clear controller/processor roles, sub-processor controls, and breach notification commitments.


Technical Specs

Under the Hood

Transparency builds trust. Here's exactly what protects your data at every layer of our stack.

Encryption at Rest
AES-256 — military-grade symmetric encryption Active
Encryption in Transit
TLS 1.2+ — all connections encrypted with modern cipher suites Active
Transport Security
HSTS Preload — strict transport security with 1-year max-age, includeSubDomains Active
Content Security
CSP Headers — strict Content-Security-Policy preventing XSS & injection attacks Active
Frame Protection
X-Frame-Options: SAMEORIGIN — preventing clickjacking attacks Active
Authentication
SHA-256 + MFA — hashed credentials with multi-factor for admin access Active
Access Control
Role-Based (RBAC) — principle of least privilege across all systems
Network Security
Firewall + IDS — network segmentation, intrusion detection, WAF protection
Vulnerability Mgmt
Continuous Scanning — regular security assessments, automated patching
Data Residency
Canada Only — primary infrastructure in Canadian data centers 🇨🇦
Backup
Encrypted + Tested — automated backups with verified restoration procedures
Log Retention
90 Days — continuous security monitoring and audit logging

AI-Specific

Responsible AI Commitment

Our AI systems are built with privacy-by-design. Your data trains your models — never ours.

01

No Training on Your Data

We never use client data to train, fine-tune, or benchmark our AI models without explicit written consent. Model improvements come from aggregated, anonymized datasets only.

02

Human Oversight Always

AI outputs are recommendations, not decisions. All significant business decisions remain under human control. No fully automated decision-making with legal or significant effects.

03

Auditable AI Processing

Every AI operation is logged and auditable. Model inputs and outputs containing personal information are subject to the same security and retention controls as all other data.

04

Isolated Client Environments

Each client's data is processed in isolated environments. No cross-contamination between clients. Your competitive intelligence stays yours alone.


Questions About
Security?

We're happy to walk through our security practices in detail, provide our DPA, or discuss specific compliance requirements for your organization.