Security at iTrepreneur
Your business data is our top priority. We implement industry-leading security measures to protect your information and maintain your trust.
Our Security Commitment
At iTrepreneur, we understand that your business data is critical to your success. We employ multiple layers of security to ensure your information remains confidential, secure, and available only to you.
SOC 2 Type II Compliant
Independently audited for security, availability, and confidentiality
GDPR Compliant
Full compliance with EU data protection regulations
Data Protection
Encryption
- •Data in Transit:All data transmitted between your device and our servers is encrypted using TLS 1.3 with 256-bit encryption.
- •Data at Rest:Your stored data is encrypted using AES-256 encryption with regularly rotated encryption keys.
- •End-to-End Encryption:Sensitive business metrics and financial data are protected with additional end-to-end encryption.
Data Isolation
Each customer's data is logically separated and isolated from other customers' data. We use strict access controls and data segmentation to ensure your business information remains private and secure.
Data Retention
We retain your data only as long as necessary to provide our services. Deleted data is permanently removed from our systems within 30 days, with no ability to recover it after this period.
Infrastructure Security
Cloud Infrastructure
Our platform is hosted on AWS, leveraging their world-class security infrastructure:
- Multiple availability zones for redundancy
- 24/7 physical security at data centers
- Automated backup and disaster recovery
- DDoS protection and mitigation
Network Security
Multiple layers of network protection ensure your data remains secure:
- Web Application Firewall (WAF)
- Intrusion detection and prevention
- Regular security scanning and monitoring
- Isolated network segments
Access Control & Authentication
User Authentication
- • Secure password requirements with complexity validation
- • Two-factor authentication (2FA) available for all accounts
- • Session management with automatic timeout
- • OAuth 2.0 integration for single sign-on (SSO)
- • Account lockout after failed login attempts
Internal Access
- • Principle of least privilege for all staff
- • Background checks for all employees
- • Regular access reviews and audits
- • Encrypted VPN access for remote work
- • Comprehensive audit logs of all access
AI Security & Privacy
Our AI-powered coaching system is designed with privacy and security at its core:
Your Data, Your Control
- We never use your business data to train AI models
- Your data is not shared with OpenAI or other AI providers for training
- All AI processing is done in isolated, secure environments
- You can request complete data deletion at any time
Incident Response
In the unlikely event of a security incident, we have comprehensive response procedures:
24-Hour Response
Our security team responds to incidents within 24 hours of detection
Immediate Notification
Affected users are notified within 72 hours as required by law
Forensic Analysis
Complete investigation to understand scope and prevent recurrence
Transparent Communication
Clear updates throughout the resolution process
Continuous Security Improvement
Security is not a one-time effort. We continuously improve our security posture through:
Regular Audits
Annual third-party security audits and penetration testing
Security Training
Ongoing security awareness training for all employees
Patch Management
Regular updates and patches to address vulnerabilities
Security Questions?
Our security team is here to help. If you have any questions about our security practices or need to report a security issue, please contact us.