Your Contracts, Protected
Safeguarding your data is our top priority. Our software leverages security protocols to ensure the confidentiality, integrity, and availability of your data.
Cloud Security Infrastructure
Data Encryption: Your data is protected both in transit and at rest, using 256-bit encryption algorithms to safeguard against unauthorized access, including TLS 1.2 and 1.3.
User Authentication: Utilizing trusted identity management providers like Auth0, we ensure only authorized personnel access your contract data.
Regular Audits: Routine security audits and assessments by auditors and penetration testers are performed to ensure security of your contract data.
βCertified: Common Paper's SOC 2 Type 2 report is available upon request.
Continuous Improvement
We stay up to date with the latest security patches for all critical operating systems, databases, frameworks, and libraries. We build on stable, secure technologies rather than adopt unproven technology. At Common Paper, we continuously enhance our platform to be more secure as well as deliver new features, helping our product stay ahead of the curve to safeguard your data against emerging threats.
Additional Privacy and Legal Resources
See our privacy policy, website terms of use, and product terms of service.