SOC 2 Aligned Security Practices

Security & Compliance

Your data security is our top priority. We implement enterprise-grade security controls aligned with SOC 2 Trust Service Criteria.

SOC 2 Trust Service Criteria

While we are not yet SOC 2 certified, we have implemented controls aligned with all five SOC 2 Trust Service Criteria to ensure comprehensive security.

Security

Protection against unauthorized access through encryption, access controls, and monitoring.

  • TLS 1.3 encryption in transit
  • AES-256 encryption at rest
  • WAF protection
  • DDoS mitigation
Availability

Systems are available for operation and use as committed.

  • 99.9% uptime SLA
  • Multi-region redundancy
  • Automatic failover
  • Real-time monitoring
Processing Integrity

System processing is complete, valid, accurate, and timely.

  • Input validation
  • Output verification
  • Error handling
  • Audit trails
Confidentiality

Information designated as confidential is protected.

  • Data classification
  • Access controls
  • Secure disposal
  • NDA with vendors
Privacy

Personal information is collected, used, and retained appropriately.

  • GDPR compliant
  • CCPA compliant
  • Data minimization
  • Consent management

Security Controls

Comprehensive security measures to protect your data at every level.

Infrastructure Security

  • Hosted on Vercel's SOC 2 Type II certified infrastructure
  • Supabase (SOC 2 Type II) for database and authentication
  • Automatic security patches and updates
  • Geographic data residency options

Data Protection

  • End-to-end encryption for all data
  • Secure key management with rotation
  • Regular encrypted backups
  • Data anonymization for analytics

Access Control

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA)
  • Session management and timeout
  • Principle of least privilege

Monitoring & Response

  • 24/7 security monitoring
  • Anomaly detection and alerting
  • Incident response procedures
  • 72-hour breach notification

Certified Infrastructure Partners

We only work with vendors who meet the highest security standards.

Vercel

SOC 2 Type II

Hosting provider

Supabase

SOC 2 Type II

Database & Auth

Stripe

PCI DSS Level 1

Payment processing

OpenAI

SOC 2 Type II

AI processing

Regulatory Compliance

GDPR

Full compliance with EU General Data Protection Regulation:

  • Lawful basis for processing
  • Data subject rights
  • Data Protection Impact Assessments
  • Standard Contractual Clauses
CCPA

California Consumer Privacy Act compliance:

  • Right to know and access
  • Right to delete
  • Right to opt-out (no sale)
  • Non-discrimination
Data Protection

Additional data protection measures:

  • UK GDPR compliant
  • Privacy by design
  • Regular security assessments
  • Employee security training

Incident Response

In the unlikely event of a security incident, we follow a documented incident response process:

Detection within minutes
Containment within 1 hour
Notification within 72 hours
Security Questions

For security-related questions, compliance documentation, or to request our security questionnaire responses:

security@wilburads.com
Report a Vulnerability

If you discover a security vulnerability, please report it responsibly. We appreciate your help in keeping Wilbur Ads secure.

Report a vulnerability

Need More Information?

We're happy to provide additional security documentation, answer questionnaires, or discuss our security practices in detail.