Ours Privacy

Trust Center

Security Practices

Learn about our security measures and compliance standards

Request access to security and compliance documents. Our security team will respond within 2 business days.

For immediate inquiries, contact ciso@oursprivacy.com

SOC 2 Type II

The SOC 2 Type 2 report is an annual third-party evaluation of our information security program. Standardized Controls for security, availability, processing integrity and confidentiality under the Trust Service criteria are designed and evaluated for operational effectiveness over the previous 3-12 months. This comprehensive audit demonstrates our commitment to maintaining the highest standards of security and compliance.

Penetration Test Executive Summary

Our penetration test executive summary provides a high-level overview of security testing conducted by independent third-party security experts. The report outlines key findings, vulnerabilities identified, and remediation efforts undertaken to strengthen our security posture. This document demonstrates our proactive approach to identifying and addressing potential security risks.

Subprocessors list

This comprehensive list details all third-party subprocessors that may process customer data on our behalf. The list includes information about each subprocessor's role, location, and the types of data they may access. We maintain strict contractual requirements with all subprocessors to ensure they meet our security and privacy standards.

Statement on Artificial Intelligence Usage

Our statement on artificial intelligence usage provides clarity on how AI tools are — and are not — utilized within our organization. It covers our core platform and data processing practices, our commitment to data privacy, and our approach to responsible AI governance. This document directly addresses the most common AI-related questions that arise during security diligence.

Request security assessment

Request a customized security assessment tailored to your organization's needs. Our security team provides detailed information about our security controls and compliance posture, and answers questions to support your vendor evaluation and due diligence process.