Sign in Run Free Scan
Trust Center

Trust at AIVZ.

The security, privacy, and data-handling practices that govern how AIVZ operates on your behalf — and on your customers' behalf. Honest about what's in place today and what's on the roadmap.

Contact security See the full security overview
Posture

What AIVZ commits to.

The plain-language version of how AIVZ thinks about trust. The detailed artifacts — privacy policy, security overview, subprocessor list, terms of service — are linked below.

01

We minimize the data we collect.

AIVZ scans publicly accessible URLs and ingests the responses. We don't request access to your customer database, your CRM, or any system not explicitly required for the integration you've enabled.

02

We're transparent about who processes data.

A current subprocessor list lives at /subprocessors — every third-party service we use to deliver AIVZ, what data they process, and where they're located. Updated when the list changes.

03

We don't sell customer data. Ever.

AIVZ's revenue model is subscription. We don't have a secondary data-monetization revenue line and we never will.

04

We support customer data rights.

GDPR, CCPA, and equivalent regional regulations. Request access, export, or deletion through the contact form or by emailing the security team.

05

We're honest about what we haven't done yet.

AIVZ is a startup. SOC 2 Type II audit is on the roadmap, not in hand. ISO 27001 is on the roadmap. The security posture published today is honest about what's standard practice and what's audited.

Artifacts

The full trust posture, by artifact.

Each card links to a detailed page or downloadable artifact. This is the routing layer for procurement teams, security reviewers, and customers who want the source documents.

Status

Where AIVZ stands today.

An honest view of which assurance artifacts are in place, which are on the roadmap, and which are out of scope for AIVZ's current offering.

ArtifactCurrent state
GDPR complianceIn place — see /privacy
CCPA complianceIn place — see /privacy
SOC 2 Type IIn progress
SOC 2 Type IIRoadmap
ISO 27001Roadmap
HIPAANot in scope — AIVZ doesn't process PHI in standard configurations
FedRAMPNot in scope
PCI-DSSNot in scope — payment processing handled by subprocessors
Annual penetration testIn progress
Bug bounty programRoadmap
Roadmap
SOC 2 Type II
Third-party operational audit covering security, availability, and confidentiality.
In place
GDPR
EU/UK data protection — SCCs in place for transfers; rights-tooling exposed via /privacy.
In place
CCPA / CPRA
California privacy rights — including the no-sell-or-share commitment.
Roadmap
ISO 27001
International information security management standard — audit timeline TBD.
Last reviewed: May 2, 2026
Trust posture is reviewed annually and on every material change.

Reach the security team.

For security questions, vulnerability disclosures, security-review requests, or DPA requests.

[email protected]

Response SLA: acknowledgement within 1 business day; substantive response within 5 business days.

Trust · Center