Transposit Trust

Customer trust and data security are critical to everything we do at Transposit. To ensure your data is secure at all times, security is built into the fabric of our product, infrastructure, and processes. We’ve outlined below key steps we take to protect our customers and community:

Encryption

Transposit enforces TLS 1.2 or higher to encrypt data in transit and data at rest is protected with AES-256 bit encryption.

Data Ownership

You own your data. Transposit does not sell information to third-parties and customer data is retained no longer than 60 days following termination of contract.

Single Sign-On (SSO)

Securely authenticate and authorize accounts with SAML 2.0 and OAuth 2.0 support.

Availability

Transposit’s system status is publicly available and uptime is continuously monitored.

SOC 2 Type 2 Accredited

Reach out to security@transposit.com for full report details.

Additional Links

List of Transposit Sub-Processors

Found a security vulnerability? View our responsible disclosure policy here.