Trust & Compliance
Your data security is our priority. Learn how we protect your information and maintain the highest compliance standards.
GDPR Compliant
Full compliance with EU data protection regulations
CCPA Compliant
California Consumer Privacy Act compliance
SOC 2 Type II
Annual third-party security audits
256-bit Encryption
Bank-grade encryption for all data
GDPR Compliance
Soryxa is fully compliant with the General Data Protection Regulation (GDPR). We process data under the lawful basis of legitimate interest and offer Data Processing Agreements to all customers.
- ✔ Lawful basis for processing (Legitimate Interest)
- ✔ Data Processing Agreement (DPA) available on request
- ✔ Right to access, rectify, and delete your data
- ✔ 30-day data retention policy for validation logs
- ✔ No data selling or sharing with third parties
EU GDPR
General Data Protection Regulation
CCPA
California Consumer Privacy Act
CCPA Compliance
We comply with the California Consumer Privacy Act (CCPA), ensuring California residents have full control over their personal information.
- ✔ We do not sell personal information
- ✔ Right to Know what data we collect
- ✔ Right to Delete your data
- ✔ Right to Opt-Out of data collection
- ✔ Non-discrimination for exercising rights
Data Processing & Retention
We are transparent about how we handle your data and for how long.
| Data Type | Purpose | Retention |
|---|---|---|
| Email addresses | Validation processing | 30 days |
| API logs | Service improvement | 90 days |
| Account data | Service provision | Account lifetime |
| Billing data | Payment processing | As required by law |
Your Data Rights
You have control over your data. Exercise your rights at any time.
Security Practices
How we protect your data at every level.
Encryption
All data encrypted in transit (TLS 1.3) and at rest (AES-256). API keys are hashed and never stored in plain text.
Infrastructure
Hosted on SOC 2 compliant cloud infrastructure. Regular penetration testing and vulnerability assessments.
Access Control
Role-based access control. All access logged and monitored. Multi-factor authentication required.
Questions About Compliance?
Our team is here to help.