← Back to Home
Security & Trust

Your data is always secure

Growth Protocol maintains a Trust Center where customers can request access to compliance documentation, including SOC 2 material. We never train on client data.

🛡️

SOC 2 Type II

Independently audited security controls verified by AICPA-accredited auditors

🔐

AES-256 Encryption

All data encrypted at rest and in transit using industry-standard protocols

🌍

GDPR Compliant

Full compliance with European data protection regulations and privacy standards

Security Practices

Enterprise-grade security built into every layer of the platform.

Zero Data Retention

Client data is accessed only during inference, then immediately destroyed. No copies, no caches, no exceptions.

No Model Training

We never train on client data. Your proprietary information remains exclusively yours.

SSO & RBAC

Enterprise single sign-on and role-based access controls for granular permission management.

ISO 27001 Aligned

Information security management practices aligned with international standards.

Penetration Testing

Regular third-party penetration testing and vulnerability assessments.

Incident Response

Documented incident response procedures with defined SLAs and escalation paths.

All systems operational View Status Page →

Request Compliance Documentation

Access our SOC 2 Type II report, security questionnaire responses, and other compliance materials through our Trust Center.

Access Trust Center →