Propper Logo
Enterprise Security

Security & Compliance

Security isn't a feature. It's the foundation. Our platform is built on zero-trust principles to protect your most sensitive corporate memory.

Compliance Certifications

Independently verified to meet the highest security and privacy standards. Security controls are designed to support audits without additional preparation work.

SOC 2 Type II

Independently audited security controls

In Progress

GDPR

EU data protection compliance

ESIGN / UETA

Electronic signature compliance

CCPA

California privacy law compliant

Security Features

Multiple layers of protection keep your documents safe.

Encryption at Rest

All data is encrypted using AES-256 encryption, the same standard used by banks and government agencies.

Encryption in Transit

All data transmitted between your systems and Propper is protected with TLS 1.3 encryption.

Access Controls

Role-based access control (RBAC) ensures users only access what they need. SSO integration with major providers.

Audit Logging

Comprehensive audit trails track every action taken on documents for compliance and forensics.

Data Residency

Choose where your data is stored with regional data centers in US, EU, and APAC.

RBAC DB Controls

Role-based database access controls ensure data isolation and least-privilege access at the database level.

Data Handling Practices

We believe in transparency about how your data is handled. Here are our commitments to you:

  • Data is never sold or shared with third parties
  • Customer data is logically separated in multi-tenant architecture
  • Automatic data backup with point-in-time recovery
  • Configurable retention policies and data deletion
  • Right to erasure (GDPR Article 17) supported
  • Data portability with standard export formats

Security is Our Priority

Our security team continuously monitors for threats, conducts regular audits, and updates our practices to stay ahead of emerging risks.

Contact Security Team

Frequently Asked Questions

Common questions about our security and compliance practices.

Ready to Transform Your Document Workflow?

See where your agreement process is creating unnecessary cost and how Propper helps eliminate it.