Trust Center
Security, Privacy & Compliance at Tork
Security Overview
Encryption
- TLS 1.3 for all data in transit
- AES-256 encryption at rest
- End-to-end encryption for sensitive data
Infrastructure
- SOC 2 certified infrastructure providers (Vercel, Supabase)
- Automatic failover and redundancy
- DDoS protection and WAF
Access Controls
- Role-based access control (RBAC)
- API key authentication with scopes
- Audit logging of all access
Monitoring
- 24/7 security monitoring
- Real-time threat detection
- Automated vulnerability scanning
Compliance Status
SOC 2 Type II
In ProgressTarget completion subject to change
ISO 27001
PlannedCertification planned for Q4 2026
Compliance Roadmap
Security Foundation
- Infrastructure hardening
- Encryption implementation
- Access controls
Compliance Documentation
- DPA published
- BAA published
- Privacy policy updates
SOC 2 Type II
- Audit preparation
- Control testing
- Report generation
ISO 27001
- ISMS implementation
- Certification audit
- Continuous improvement
Data Residency
Primary Data Location
All customer account data, audit logs, and persistent storage is located in AWS us-east-1 (Virginia, USA).
Our database provider (Supabase) maintains SOC 2 Type II certification with encryption at rest and in transit.
API Processing
Content sent to our APIs for evaluation is processed in real-time memory only and is NOT persisted after the API call completes.
Edge functions may process requests at the nearest Vercel edge location for optimal latency.
Regional Deployment: We are actively working on regional deployment options for customers with specific data residency requirements (EU, APAC). Contact us to discuss your needs.
Sub-processors
For a complete list of sub-processors and notification of changes, contact privacy@tork.network to request our Data Processing Agreement.
Legal Documents
Incident Response
We maintain a documented incident response plan to ensure rapid detection, containment, and resolution of security incidents.
Security FAQ
Trusted by Teams Worldwide
See how organizations use Tork to build safer, more compliant AI systems.
Read customer testimonials →Security Inquiries
For security questions, vulnerability reports, or to request security documentation, contact our security team.
security@tork.networkFor general inquiries, email us at hello@tork.network