Your data security is our priority
We implement industry-standard security practices to protect your data and maintain your trust.
Encryption
All data encrypted at rest using AES-256 and in transit using TLS 1.3.
Compliance-Aligned
Architecture designed to align with SOC 2, GDPR, and CCPA requirements.
Access Controls
Role-based access controls with comprehensive audit logging.
Secure Infrastructure
Hosted on enterprise-grade cloud infrastructure with redundancy.
Compliance alignment
Our infrastructure and processes are designed to align with major regulatory frameworks. We are transparent about our current status and certification roadmap.
GDPR
European data protection regulation
Our data handling practices are designed to comply with GDPR requirements including data minimization, purpose limitation, and user rights.
CCPA
California Consumer Privacy Act
We provide California residents with rights to know, delete, and opt-out of data sales (we do not sell personal data).
SOC 2 Type II
Security & availability controls
Our infrastructure and processes are designed following SOC 2 principles. Formal certification is on our roadmap.
PCI DSS
Payment card data security
We do not store payment card data. All payment processing is handled by Stripe, a PCI DSS Level 1 certified provider.
We are committed to transparency about our security posture. While we implement industry-standard security controls and design our systems to comply with major frameworks, formal third-party certifications are part of our ongoing roadmap as we scale.
Secure by design
Vurrk is architected with security as a foundational principle. Sensitive operations stay server-side, APIs enforce authorization and validation, and all trust-critical actions are auditable.
Security practices
We follow industry best practices across all areas of our platform.
Data Protection
- AES-256 encryption for data at rest
- TLS 1.3 encryption for data in transit
- Secure key management with rotation policies
- Database-level row security enforcement
Access & Authentication
- Multi-factor authentication available
- Session management with secure tokens
- Role-based access control (RBAC)
- API key scoping and rotation
Infrastructure
- Enterprise-grade cloud hosting
- Geographic redundancy for critical data
- Automated backups with point-in-time recovery
- Network isolation and firewall protection
Monitoring & Response
- Real-time security monitoring
- Automated threat detection
- Incident response procedures
- Regular security assessments
Data protection
Your verified records are immutable by design — that's the foundation of trust. You maintain ownership of your data and can export it at any time.
Responsible disclosure
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly so we can address it promptly.
Email: security@vurrk.com
Response time: We aim to acknowledge reports within 24 hours
Please include: Description, steps to reproduce, potential impact
Security FAQs
Answers to common security and compliance questions.
Are you SOC 2 certified?
How do you handle GDPR compliance?
Do you expose any database credentials in the frontend?
How do you protect data in transit and at rest?
Can clients verify records without creating an account?
How do you handle payment data?
Do you support audit trails?
Can I restrict API access?
Where is my data stored?
How can I report a security issue?
Have security questions?
Our team is available to discuss your specific security requirements.
Contact Us