Security & Compliance
Security & Compliance
Security and compliance are fundamental to Outrun's architecture. We implement comprehensive security measures and maintain strict compliance standards to protect your data while enabling global business operations.
π Security First
Your data security and privacy are our top priorities. We implement enterprise-grade security measures and maintain transparent compliance practices across all regions.
Compliance Framework
SOC 2 Compliance Journey
We are actively working towards SOC 2 Type II certification:
- Current Status: SOC 2 compliance implementation in progress
- Target Completion: Full certification by Q2 2024
- Scope: All data processing and storage operations
- Third-Party Auditing: Independent security assessment and validation
SOC 2 Trust Principles
Our compliance framework addresses all five trust principles:
π‘οΈ Security
- β’ Multi-factor authentication
- β’ Encryption at rest and in transit
- β’ Access controls and monitoring
- β’ Incident response procedures
π Availability
- β’ 99.9% uptime SLA
- β’ Multi-region redundancy
- β’ Automated failover systems
- β’ Disaster recovery planning
π Processing Integrity
- β’ Data validation and verification
- β’ Audit trails and logging
- β’ Error detection and correction
- β’ Quality assurance processes
π Confidentiality
- β’ Data encryption and protection
- β’ Access restriction controls
- β’ Employee background checks
- β’ Confidentiality agreements
Regional Compliance Strategy
Data Localization Benefits
Our regional provider strategy enhances compliance:
- Local Jurisdiction: Providers domiciled in their operating regions
- Regulatory Expertise: Deep understanding of local data protection laws
- Reduced Risk: Minimized cross-border data transfer complications
- Audit Simplification: Streamlined compliance verification processes
Multi-Jurisdiction Support
πͺπΊ GDPR Compliance
- β’ EU data stored within EU boundaries
- β’ Right to be forgotten implementation
- β’ Data portability support
- β’ Consent management systems
- β’ Data Protection Impact Assessments
πΊπΈ US Privacy Laws
- β’ CCPA compliance for California data
- β’ CPRA enhanced privacy rights
- β’ State-specific privacy requirements
- β’ Federal compliance standards
- β’ Industry-specific regulations
π¦πΊ Australian Privacy
- β’ Privacy Act 1988 compliance
- β’ Australian Privacy Principles
- β’ Notifiable data breach scheme
- β’ Consumer Data Right support
- β’ Government data handling standards
π¨π¦ PIPEDA Compliance
- β’ Personal Information Protection
- β’ Provincial privacy law alignment
- β’ Cross-border data transfer rules
- β’ Breach notification requirements
- β’ Privacy impact assessments
Data Security
Encryption Standards
Data at Rest
All stored data is encrypted using industry-standard encryption:
{
"encryptionStandard": "AES-256",
"keyManagement": "Hardware Security Modules (HSM)",
"keyRotation": "Automatic 90-day rotation",
"backupEncryption": "Separate encryption keys for backups",
"databaseEncryption": "Transparent Data Encryption (TDE)"
}
Data in Transit
All data transmission is secured with modern encryption protocols:
- TLS 1.3: Latest transport layer security
- Perfect Forward Secrecy: Unique session keys
- Certificate Pinning: Protection against man-in-the-middle attacks
- API Security: OAuth 2.0 and JWT token authentication
Access Controls
Multi-Factor Authentication (MFA)
- Required for All Users: No exceptions for administrative access
- Multiple Methods: SMS, authenticator apps, hardware tokens
- Conditional Access: Risk-based authentication policies
- Session Management: Automatic timeout and re-authentication
Role-Based Access Control (RBAC)
{
"roles": {
"workspace_admin": {
"permissions": ["read", "write", "delete", "manage_users"],
"scope": "workspace"
},
"data_analyst": {
"permissions": ["read", "export"],
"scope": "specific_sources"
},
"integration_manager": {
"permissions": ["read", "write", "configure_sources"],
"scope": "integrations"
}
}
}
Security Monitoring
Continuous Monitoring
- 24/7 Security Operations Center: Real-time threat monitoring
- Automated Threat Detection: AI-powered anomaly detection
- Incident Response: Rapid response to security events
- Vulnerability Management: Regular security assessments and patching
Audit Logging
All system activities are comprehensively logged:
- User Actions: Complete audit trail of user activities
- System Events: Infrastructure and application events
- Data Access: Detailed logging of data access patterns
- API Calls: Full API request and response logging
- Retention: 7-year log retention for compliance
Data Ownership & Privacy
Your Data Belongs to You
Clear Ownership Policy
- Customer Data Ownership: You retain full ownership of all data you provide
- No Secondary Use: We never use your data for our own business purposes
- No Data Mining: Your data is not analyzed for competitive intelligence
- No Advertising: Your data is never used for advertising or marketing
Data Usage Transparency
{
"dataUsage": {
"customerData": {
"purpose": "Providing synchronization services only",
"sharing": "Never shared with third parties",
"retention": "As long as you maintain your account",
"deletion": "Complete deletion upon account termination"
},
"analyticsData": {
"purpose": "Improving user experience and platform performance",
"collection": "Anonymized usage patterns only",
"sharing": "Aggregated insights only, never individual data",
"optOut": "Available upon request"
}
}
}
Data Isolation
Workspace-Level Separation
- Logical Database Isolation: Each workspace has separate database instances
- Access Boundaries: Strict enforcement of workspace boundaries
- No Cross-Contamination: Data never mixed between workspaces
- Independent Processing: Separate processing pipelines per workspace
Multi-Tenant Security
- Tenant Isolation: Complete separation between customer environments
- Resource Allocation: Dedicated resources prevent resource-based attacks
- Network Segmentation: Isolated network paths for each tenant
- Monitoring Separation: Independent monitoring and alerting per tenant
Australian Business Stability
Regulatory Environment
Outrun is headquartered in Australia, providing several advantages:
Political Stability
- Stable Democracy: Consistent regulatory environment
- Rule of Law: Strong legal framework and property rights
- International Relations: Respected member of international community
- Economic Stability: AAA credit rating and stable currency
Data Sovereignty Respect
- International Law Compliance: Respect for other nations' data sovereignty
- No Forced Data Access: Strong legal protections against forced data disclosure
- Transparent Legal Process: Clear legal procedures for any data requests
- Customer Notification: Commitment to notify customers of any legal requests
Business Continuity
Corporate Governance
- Australian Corporate Law: Governed by robust corporate regulations
- Financial Transparency: Regular financial reporting and auditing
- Board Oversight: Independent board governance and oversight
- Regulatory Compliance: Full compliance with Australian business regulations
Operational Resilience
- Disaster Recovery: Comprehensive business continuity planning
- Financial Stability: Strong financial position and backing
- Team Distribution: Globally distributed team for operational resilience
- Vendor Diversification: Multiple vendor relationships to reduce single points of failure
Analytics & Tracking
Platform Analytics
We collect limited analytics data to improve our service:
What We Collect
- Usage Patterns: How features are used (anonymized)
- Performance Metrics: System performance and reliability data
- Error Tracking: Application errors and system issues
- User Interface Interactions: UI usage patterns for improvement
What We Don't Collect
- Personal Data: No personally identifiable information in analytics
- Business Data: No access to your actual business data
- Sensitive Information: No collection of sensitive or confidential data
- Cross-Workspace Data: No correlation of data across different workspaces
Tracking Pixels
Limited use of tracking pixels for user experience optimization:
{
"trackingPixels": {
"purpose": "User experience optimization",
"dataCollected": [
"Page views and navigation patterns",
"Feature usage statistics",
"Performance metrics",
"Error occurrences"
],
"dataNotCollected": [
"Personal information",
"Business data content",
"Cross-site tracking",
"Third-party sharing"
],
"optOut": "Available in user preferences"
}
}
Incident Response
Security Incident Management
Response Timeline
- Detection: Automated monitoring with < 5 minute detection
- Assessment: Initial assessment within 15 minutes
- Containment: Immediate containment measures within 30 minutes
- Communication: Customer notification within 2 hours (if affected)
- Resolution: Full resolution and post-incident review
Communication Protocol
- Immediate Notification: Critical security incidents
- Regular Updates: Status updates every 2 hours during incidents
- Post-Incident Report: Detailed analysis within 48 hours
- Lessons Learned: Process improvements based on incidents
Data Breach Response
Breach Management Process
- Immediate Containment: Stop the breach and secure systems
- Impact Assessment: Determine scope and affected data
- Regulatory Notification: Comply with breach notification laws
- Customer Communication: Transparent communication with affected customers
- Remediation: Implement fixes and prevent recurrence
Compliance Certifications
Current Certifications
- ISO 27001: Information Security Management (in progress)
- SOC 2 Type II: Security and availability controls (in progress)
- Regional Compliance: GDPR, CCPA, Privacy Act compliance
Planned Certifications
- ISO 27017: Cloud security controls
- ISO 27018: Cloud privacy controls
- FedRAMP: US government cloud security (future consideration)
Best Practices for Customers
Data Security Recommendations
- Strong Authentication: Use MFA for all user accounts
- Regular Access Reviews: Periodically review user access permissions
- Data Classification: Classify data sensitivity levels appropriately
- Incident Reporting: Report any suspected security incidents immediately
Compliance Preparation
- Data Mapping: Understand what data is stored where
- Privacy Policies: Update privacy policies to reflect Outrun usage
- Consent Management: Ensure proper consent for data processing
- Regular Audits: Conduct regular compliance audits
Next Steps
ποΈ Learn About Storage
Understand Outrun's multi-region storage architecture and data placement.
Storage Architecture βSecurity and compliance are not just features - they're fundamental to how we build and operate Outrun. Your trust is our most valuable asset.