Security & Compliance

Protecting your data with enterprise-grade security measures

Last updated: June 2025

Security Overview

Security is fundamental to LedgerLink's design. We implement multiple layers of protection to ensure your sensitive financial documents and data remain secure throughout processing.

End-to-End Encryption

All data encrypted in transit with TLS 1.3 and at rest with AES-256 encryption

SOC 2 Compliance

Enterprise plans include SOC 2 Type II compliance for security and availability

Automatic Deletion

PDF files automatically deleted within 24 hours of processing completion

Infrastructure Security

Cloud Infrastructure

LedgerLink is hosted on Vercel's secure cloud platform with enterprise-grade infrastructure:

  • Global Edge Network: Content delivered from secure edge locations worldwide
  • DDoS Protection: Automatic protection against distributed denial-of-service attacks
  • SSL/TLS Certificates: Automatic certificate management and renewal
  • Network Isolation: Secure network boundaries and access controls
  • Infrastructure Monitoring: 24/7 monitoring and automatic threat detection

Database Security

Our PostgreSQL databases are secured with multiple layers of protection:

  • Encryption at Rest: AES-256 encryption for all stored data
  • Connection Pooling: Secure connection management and rate limiting
  • Access Controls: Role-based access with principle of least privilege
  • Regular Backups: Automated encrypted backups with point-in-time recovery
  • Network Security: Private network access with VPC isolation

Application Security

Authentication & Authorization

  • Secure Authentication: NextAuth.js with bcryptjs password hashing
  • Session Management: JWT-based sessions with automatic expiration
  • Multi-Factor Authentication: Available for Enterprise customers
  • Role-Based Access: Plan-based feature access controls
  • Password Security: Strong password requirements and breach detection

API Security

  • Rate Limiting: Tier-based API rate limits to prevent abuse
  • Input Validation: Comprehensive validation and sanitization
  • CORS Protection: Strict cross-origin resource sharing policies
  • Request Filtering: Malicious request detection and blocking
  • API Monitoring: Real-time monitoring and alerting

File Processing Security

  • File Type Validation: Strict PDF format validation and verification
  • Size Limitations: Plan-based file size restrictions
  • Malware Scanning: Automated scanning for malicious content
  • Sandboxed Processing: Isolated processing environment
  • In-Memory Processing: PDF files processed in memory only - never persisted to database
  • Temporary Storage: Secure temporary storage with automatic cleanup within 24 hours

Data Protection & Privacy

Data Encryption

  • In Transit: TLS 1.3 encryption for all data transmission
  • At Rest: AES-256 encryption for stored data
  • Processing: Encrypted communication with AI service providers
  • Backups: Encrypted backup storage with secure key management

Data Retention & Deletion

🔒 Maximum Privacy Protection: PDF Files Never Stored in Database

Your original PDF documents are processed in memory only and never stored in our database. This ensures maximum privacy protection for your sensitive financial documents. We also do not store any extracted data - all processing results are provided to you immediately and then deleted from our systems.

  • PDF Files: NEVER stored in database - processed in memory only and automatically deleted within 24 hours
  • Processing Results: Converted files provided to you immediately upon completion - no extracted data retained in our systems
  • User Data: Deleted within 90 days of account termination
  • Secure Deletion: Cryptographic erasure and secure overwriting
  • Right to Deletion: User-initiated data deletion available

AI Processing Security

We use trusted AI service providers with enhanced security measures:

  • Enterprise AI APIs: Business-grade APIs with zero data retention
  • Cloud AI Services: Enterprise security with data residency controls
  • Local Fallbacks: On-premises processing options for sensitive data
  • Data Isolation: Customer data never mixed or shared
  • Processing Logs: Secure audit trails without content storage

Compliance & Certifications

Enterprise Compliance

Enterprise Plan customers receive enhanced compliance features:

  • SOC 2 Type II compliance certification
  • GDPR compliance with data processing agreements
  • HIPAA compliance options for healthcare customers
  • Custom compliance reports and auditing

Privacy Regulations

  • GDPR Compliance: Full compliance with EU data protection regulation
  • CCPA Compliance: California Consumer Privacy Act compliance
  • Data Processing Agreements: Available for enterprise customers
  • Privacy by Design: Privacy considerations in all system design
  • Regular Audits: Third-party security and privacy audits

Financial Data Security

  • PCI DSS Alignment: Payment card industry security standards
  • Financial Services Security: Enhanced protections for financial documents
  • Audit Trail: Comprehensive logging for compliance reporting
  • Data Residency: Geographic data storage controls

Incident Response & Monitoring

Security Monitoring

  • 24/7 Monitoring: Continuous security monitoring and threat detection
  • Automated Alerts: Real-time alerting for security events
  • Log Analysis: Comprehensive security log analysis and correlation
  • Threat Intelligence: Integration with global threat intelligence feeds
  • Performance Monitoring: System performance and availability monitoring

Incident Response

  • Response Team: Dedicated security incident response team
  • Response Plan: Documented incident response procedures
  • Communication: Transparent communication during security events
  • Recovery Procedures: Tested backup and recovery processes
  • Post-Incident Analysis: Thorough analysis and improvement measures

Business Continuity

  • High Availability: 99.9% uptime SLA for Enterprise customers
  • Disaster Recovery: Comprehensive disaster recovery planning
  • Data Backup: Regular automated backups with geographic redundancy
  • Failover Systems: Automatic failover for critical services
  • Recovery Testing: Regular testing of recovery procedures

Vulnerability Management

Security Testing

  • Penetration Testing: Regular third-party security assessments
  • Vulnerability Scanning: Automated vulnerability detection and remediation
  • Code Reviews: Security code reviews for all application changes
  • Dependency Scanning: Automated scanning of third-party dependencies
  • Security Testing: Comprehensive security testing in CI/CD pipeline

Security Updates

  • Patch Management: Timely application of security patches
  • Dependency Updates: Regular updates of software dependencies
  • Security Notifications: Proactive communication of security updates
  • Emergency Response: Rapid response to critical security vulnerabilities

Employee Security & Access Controls

Access Management

  • Principle of Least Privilege: Minimum necessary access for all employees
  • Regular Access Reviews: Quarterly review and audit of access permissions
  • Multi-Factor Authentication: Required for all employee accounts
  • Secure Development: Security-first development practices and training
  • Background Checks: Security background checks for key personnel

Security Training

  • Security Awareness: Regular security training for all employees
  • Phishing Protection: Ongoing phishing awareness and testing
  • Secure Coding: Security-focused development training
  • Incident Response: Incident response training and drills

Third-Party Security

Vendor Security

We carefully evaluate and monitor the security of our key service providers:

  • Vercel: SOC 2 compliant hosting with enterprise security features
  • Stripe: PCI DSS Level 1 compliant payment processing
  • AI Service Providers: Enterprise-grade APIs with enhanced privacy protections
  • Cloud Infrastructure: ISO 27001, SOC 2, and GDPR compliant services
  • Regular Audits: Ongoing security assessments of all vendors

Data Processing Agreements

  • Business Associate Agreements: HIPAA-compliant agreements where applicable
  • Data Processing Agreements: GDPR-compliant DPAs with all processors
  • Security Requirements: Contractual security requirements for all vendors
  • Audit Rights: Right to audit security practices of key vendors

Security Reporting & Contact

Responsible Disclosure

We welcome security researchers and the community to help us improve our security. If you discover a security vulnerability:

  • Please report it to support@glintwell.com
  • Provide detailed information about the vulnerability
  • Allow us reasonable time to investigate and address the issue
  • Avoid accessing or modifying user data
  • Do not disclose the vulnerability publicly until we have addressed it

Security Documentation

Enterprise customers can request additional security documentation:

  • Security questionnaires and assessments
  • SOC 2 Type II reports
  • Penetration testing results
  • Compliance certifications
  • Data processing agreements

Security Contact

For security questions, concerns, or to report vulnerabilities:

Glintwell LLC Security Team

Support: support@glintwell.com

Enterprise Sales: info@glintwell.com

Website: https://glintwell.com