Security & Compliance
Protecting your data with enterprise-grade security measures
Last updated: June 2025
Security Overview
Security is fundamental to LedgerLink's design. We implement multiple layers of protection to ensure your sensitive financial documents and data remain secure throughout processing.
End-to-End Encryption
All data encrypted in transit with TLS 1.3 and at rest with AES-256 encryption
SOC 2 Compliance
Enterprise plans include SOC 2 Type II compliance for security and availability
Automatic Deletion
PDF files automatically deleted within 24 hours of processing completion
Infrastructure Security
Cloud Infrastructure
LedgerLink is hosted on Vercel's secure cloud platform with enterprise-grade infrastructure:
- Global Edge Network: Content delivered from secure edge locations worldwide
- DDoS Protection: Automatic protection against distributed denial-of-service attacks
- SSL/TLS Certificates: Automatic certificate management and renewal
- Network Isolation: Secure network boundaries and access controls
- Infrastructure Monitoring: 24/7 monitoring and automatic threat detection
Database Security
Our PostgreSQL databases are secured with multiple layers of protection:
- Encryption at Rest: AES-256 encryption for all stored data
- Connection Pooling: Secure connection management and rate limiting
- Access Controls: Role-based access with principle of least privilege
- Regular Backups: Automated encrypted backups with point-in-time recovery
- Network Security: Private network access with VPC isolation
Application Security
Authentication & Authorization
- Secure Authentication: NextAuth.js with bcryptjs password hashing
- Session Management: JWT-based sessions with automatic expiration
- Multi-Factor Authentication: Available for Enterprise customers
- Role-Based Access: Plan-based feature access controls
- Password Security: Strong password requirements and breach detection
API Security
- Rate Limiting: Tier-based API rate limits to prevent abuse
- Input Validation: Comprehensive validation and sanitization
- CORS Protection: Strict cross-origin resource sharing policies
- Request Filtering: Malicious request detection and blocking
- API Monitoring: Real-time monitoring and alerting
File Processing Security
- File Type Validation: Strict PDF format validation and verification
- Size Limitations: Plan-based file size restrictions
- Malware Scanning: Automated scanning for malicious content
- Sandboxed Processing: Isolated processing environment
- In-Memory Processing: PDF files processed in memory only - never persisted to database
- Temporary Storage: Secure temporary storage with automatic cleanup within 24 hours
Data Protection & Privacy
Data Encryption
- In Transit: TLS 1.3 encryption for all data transmission
- At Rest: AES-256 encryption for stored data
- Processing: Encrypted communication with AI service providers
- Backups: Encrypted backup storage with secure key management
Data Retention & Deletion
🔒 Maximum Privacy Protection: PDF Files Never Stored in Database
Your original PDF documents are processed in memory only and never stored in our database. This ensures maximum privacy protection for your sensitive financial documents. We also do not store any extracted data - all processing results are provided to you immediately and then deleted from our systems.
- PDF Files: NEVER stored in database - processed in memory only and automatically deleted within 24 hours
- Processing Results: Converted files provided to you immediately upon completion - no extracted data retained in our systems
- User Data: Deleted within 90 days of account termination
- Secure Deletion: Cryptographic erasure and secure overwriting
- Right to Deletion: User-initiated data deletion available
AI Processing Security
We use trusted AI service providers with enhanced security measures:
- Enterprise AI APIs: Business-grade APIs with zero data retention
- Cloud AI Services: Enterprise security with data residency controls
- Local Fallbacks: On-premises processing options for sensitive data
- Data Isolation: Customer data never mixed or shared
- Processing Logs: Secure audit trails without content storage
Compliance & Certifications
Enterprise Compliance
Enterprise Plan customers receive enhanced compliance features:
- SOC 2 Type II compliance certification
- GDPR compliance with data processing agreements
- HIPAA compliance options for healthcare customers
- Custom compliance reports and auditing
Privacy Regulations
- GDPR Compliance: Full compliance with EU data protection regulation
- CCPA Compliance: California Consumer Privacy Act compliance
- Data Processing Agreements: Available for enterprise customers
- Privacy by Design: Privacy considerations in all system design
- Regular Audits: Third-party security and privacy audits
Financial Data Security
- PCI DSS Alignment: Payment card industry security standards
- Financial Services Security: Enhanced protections for financial documents
- Audit Trail: Comprehensive logging for compliance reporting
- Data Residency: Geographic data storage controls
Incident Response & Monitoring
Security Monitoring
- 24/7 Monitoring: Continuous security monitoring and threat detection
- Automated Alerts: Real-time alerting for security events
- Log Analysis: Comprehensive security log analysis and correlation
- Threat Intelligence: Integration with global threat intelligence feeds
- Performance Monitoring: System performance and availability monitoring
Incident Response
- Response Team: Dedicated security incident response team
- Response Plan: Documented incident response procedures
- Communication: Transparent communication during security events
- Recovery Procedures: Tested backup and recovery processes
- Post-Incident Analysis: Thorough analysis and improvement measures
Business Continuity
- High Availability: 99.9% uptime SLA for Enterprise customers
- Disaster Recovery: Comprehensive disaster recovery planning
- Data Backup: Regular automated backups with geographic redundancy
- Failover Systems: Automatic failover for critical services
- Recovery Testing: Regular testing of recovery procedures
Vulnerability Management
Security Testing
- Penetration Testing: Regular third-party security assessments
- Vulnerability Scanning: Automated vulnerability detection and remediation
- Code Reviews: Security code reviews for all application changes
- Dependency Scanning: Automated scanning of third-party dependencies
- Security Testing: Comprehensive security testing in CI/CD pipeline
Security Updates
- Patch Management: Timely application of security patches
- Dependency Updates: Regular updates of software dependencies
- Security Notifications: Proactive communication of security updates
- Emergency Response: Rapid response to critical security vulnerabilities
Employee Security & Access Controls
Access Management
- Principle of Least Privilege: Minimum necessary access for all employees
- Regular Access Reviews: Quarterly review and audit of access permissions
- Multi-Factor Authentication: Required for all employee accounts
- Secure Development: Security-first development practices and training
- Background Checks: Security background checks for key personnel
Security Training
- Security Awareness: Regular security training for all employees
- Phishing Protection: Ongoing phishing awareness and testing
- Secure Coding: Security-focused development training
- Incident Response: Incident response training and drills
Third-Party Security
Vendor Security
We carefully evaluate and monitor the security of our key service providers:
- Vercel: SOC 2 compliant hosting with enterprise security features
- Stripe: PCI DSS Level 1 compliant payment processing
- AI Service Providers: Enterprise-grade APIs with enhanced privacy protections
- Cloud Infrastructure: ISO 27001, SOC 2, and GDPR compliant services
- Regular Audits: Ongoing security assessments of all vendors
Data Processing Agreements
- Business Associate Agreements: HIPAA-compliant agreements where applicable
- Data Processing Agreements: GDPR-compliant DPAs with all processors
- Security Requirements: Contractual security requirements for all vendors
- Audit Rights: Right to audit security practices of key vendors
Security Reporting & Contact
Responsible Disclosure
We welcome security researchers and the community to help us improve our security. If you discover a security vulnerability:
- Please report it to support@glintwell.com
- Provide detailed information about the vulnerability
- Allow us reasonable time to investigate and address the issue
- Avoid accessing or modifying user data
- Do not disclose the vulnerability publicly until we have addressed it
Security Documentation
Enterprise customers can request additional security documentation:
- Security questionnaires and assessments
- SOC 2 Type II reports
- Penetration testing results
- Compliance certifications
- Data processing agreements
Security Contact
For security questions, concerns, or to report vulnerabilities:
Glintwell LLC Security Team
Support: support@glintwell.com
Enterprise Sales: info@glintwell.com
Website: https://glintwell.com