At RunLLM, Inc., we are committed to maintaining the highest standards of security to protect our customers' data.
We comply with SOC 2 Type II requirements, which means we have established stringent controls to safeguard data in line with industry best practices.
Below is an overview of our key security practices:
Data Protection
- Encryption: We ensure all sensitive data is encrypted both in transit and at rest using AES-256 encryption for data at rest and TLS 1.2+ for data in transit. Encryption keys are managed securely following best practices.
- Data Retention and Disposal: Data is retained only for as long as necessary and is securely disposed of once no longer needed, in accordance with our data retention policies.
Access Management
We regularly review access to ensure that only authorized personnel have access to sensitive systems and data.
System Monitoring & Incident Management
- Continuous Monitoring: Our infrastructure is continuously monitored for suspicious activity, anomalies, and potential security threats. We leverage real-time monitoring tools and automated alerts to detect and respond to any incidents swiftly.
- Incident Response Plan: We maintain a comprehensive incident response plan, including defined roles and responsibilities, rapid investigation protocols, and communication plans to ensure timely response to any security incidents.
Security Audits and Testing
- Regular Security Audits: We undergo regular internal and external security audits to assess the effectiveness of our security controls. Any identified issues are promptly remediated to maintain compliance and improve our security posture.
- Vulnerability Management: We use automated vulnerability scanning and perform regular penetration testing to identify and address potential vulnerabilities in our systems and software.
Business Continuity & Disaster Recovery
- Backups & Redundancy: Critical data is regularly backed up and stored in secure, geographically distributed locations to ensure redundancy and minimize data loss risks.
- Disaster Recovery: We have a disaster recovery plan in place to maintain operational resilience and ensure business continuity in the event of a disaster.
Commitment to Privacy
We respect the privacy of our customers and are dedicated to handling all personal information in compliance with applicable regulations.
For more information, please review our Privacy Policy.