Security & Compliance
Compliance Certifications
Independently verified to meet the highest security and privacy standards. Security controls are designed to support audits without additional preparation work.
SOC 2 Type II
Independently audited security controls
GDPR
EU data protection compliance
ESIGN / UETA
Electronic signature compliance
CCPA
California privacy law compliant
Security Features
Multiple layers of protection keep your documents safe.
All data is encrypted using AES-256 encryption, the same standard used by banks and government agencies.
All data transmitted between your systems and Propper is protected with TLS 1.3 encryption.
Role-based access control (RBAC) ensures users only access what they need. SSO integration with major providers.
Comprehensive audit trails track every action taken on documents for compliance and forensics.
Choose where your data is stored with regional data centers in US, EU, and APAC.
Role-based database access controls ensure data isolation and least-privilege access at the database level.
Data Handling Practices
We believe in transparency about how your data is handled. Here are our commitments to you:
- Data is never sold or shared with third parties
- Customer data is logically separated in multi-tenant architecture
- Automatic data backup with point-in-time recovery
- Configurable retention policies and data deletion
- Right to erasure (GDPR Article 17) supported
- Data portability with standard export formats
Security is Our Priority
Our security team continuously monitors for threats, conducts regular audits, and updates our practices to stay ahead of emerging risks.
Contact Security TeamFrequently Asked Questions
Common questions about our security and compliance practices.

Ready to Transform Your Document Workflow?
See where your agreement process is creating unnecessary cost and how Propper helps eliminate it.