Security
Ben Garvey avatar
Written by Ben Garvey
Updated over a week ago

Your Contracts, Protected

Safeguarding your data is our top priority. Our software leverages security protocols to ensure the confidentiality, integrity, and availability of your data.

Cloud Security Infrastructure

  • Data Encryption: Your data is protected both in transit and at rest, using 256-bit encryption algorithms to safeguard against unauthorized access, including TLS 1.2 and 1.3.

  • User Authentication: Utilizing trusted identity management providers like Auth0, we ensure only authorized personnel access your contract data.

  • Regular Audits: Routine security audits and assessments by auditors and penetration testers are performed to ensure security of your contract data.
    ​

  • Certified: Common Paper's SOC 2 Type 2 report is available upon request.

Continuous Improvement

We stay up to date with the latest security patches for all critical operating systems, databases, frameworks, and libraries. We build on stable, secure technologies rather than adopt unproven technology. At Common Paper, we continuously enhance our platform to be more secure as well as deliver new features, helping our product stay ahead of the curve to safeguard your data against emerging threats.

Additional Privacy and Legal Resources

Did this answer your question?