SOC 2 Type II
FillFaster has completed a SOC 2 Type II audit covering all five Trust Services Criteria: Security, Availability, Confidentiality, Processing Integrity, and Privacy. Our report is available to customers under NDA.
Security & Compliance
FillFaster helps you manage signatures and documents with independently audited security, GDPR-aligned privacy practices, and secure EU-based infrastructure.
To give you independent assurance, our security and compliance controls are regularly reviewed by accredited third-party auditors.
FillFaster has completed a SOC 2 Type II audit covering all five Trust Services Criteria: Security, Availability, Confidentiality, Processing Integrity, and Privacy. Our report is available to customers under NDA.
FillFaster is ISO 27001:2022 certified, the leading international standard for managing information security. Our ISMS covers the people, processes, and technology that support our platform.
We align with the requirements of the EU General Data Protection Regulation when processing personal data. We act as a Data Processor, make a DPA available, and maintain measures to support data subject rights.
FillFaster runs on a modern, secure cloud stack designed to protect your data in transit and at rest.
Primary infrastructure is hosted on Google Cloud Platform (GCP) in EU regions, with additional edge and security services provided by Cloudflare.
Network segmentation and firewall rules restrict access to production systems. Only approved services and ports are exposed following a least-privilege approach.
All connections to FillFaster use TLS to encrypt data in transit. Data at rest is encrypted using industry-standard encryption mechanisms at the storage level.
We limit access to systems and monitor the health of the FillFaster platform continuously.
Employee access to production environments is restricted based on business need. Strong authentication is enforced, and access rights are reviewed periodically.
Key components generate logs to detect anomalies. We maintain an internal incident response process for assessing, containing, and remediating security events.
We treat your data with care. Documents are retained according to your account configuration, and upon request, we can delete or anonymize personal data.