Skip to main content

Compliance & Certifications

RedPill maintains industry-standard compliance certifications to demonstrate our commitment to security and privacy.
For compliance reports, security documentation, or to schedule a security review, contact [email protected].

Compliance Reports

SOC 2 Type I

SOC 2 Type I Report

Service Organization Control 2 Type I report validating our security, availability, and confidentiality controls.
The SOC 2 Type I report covers:
  • Security - Protection against unauthorized access
  • Availability - System uptime and reliability
  • Confidentiality - Protection of confidential information
Report available upon request for customers and prospects.

HIPAA Compliance

HIPAA Compliance

Health Insurance Portability and Accountability Act compliance for healthcare customers.Status: Coming Soon
RedPill is working toward HIPAA compliance certification to support healthcare customers with Protected Health Information (PHI) requirements. Current protections in place:
  • TEE-based data isolation
  • End-to-end encryption
  • Access controls
  • Audit logging
  • Zero data retention option
For healthcare organizations: Contact [email protected] for:
  • Business Associate Agreement (BAA)
  • Security documentation
  • Compliance roadmap

GDPR

RedPill complies with the General Data Protection Regulation (GDPR) for EU users:
RequirementHow We Comply
Data minimizationZero data retention by default
Right to accessExport your data anytime
Right to deletionDelete account and all data
Data portabilityExport in standard formats
Privacy by designTEE + E2E encryption architecture

Data Processing Agreement

Request our DPA for enterprise customers →

Security Controls

RedPill implements comprehensive security controls across multiple domains:
  • End-to-end encryption for all user data
  • TEE-based processing (data never exposed in plaintext)
  • Encryption at rest using AES-256
  • Encryption in transit using TLS 1.3
  • Zero data retention by default
  • Role-based access control (RBAC)
  • Multi-factor authentication required for all employees
  • Periodic access reviews
  • Least-privilege access principles
  • SSO integration (Enterprise)
  • Web Application Firewall (WAF)
  • DDoS protection
  • Network segmentation
  • Encrypted connections only
  • Regular security scanning
  • Documented incident response plan
  • Security event monitoring
  • Breach notification procedures
  • Post-mortem reviews
  • Regular incident response drills
  • Regular vulnerability scans
  • Responsible disclosure program
  • Dependency monitoring
  • Patch management procedures
  • Centralized logging
  • Real-time alerting
  • Audit trails (encrypted)
  • Anomaly detection

Regulatory Compliance

RedPill helps customers meet various regulatory requirements:
RegulationHow RedPill Helps
HIPAATEE isolation, E2E encryption, audit logging, BAA available
GDPRData minimization, encryption, deletion rights, DPA available
SOC 2Certified Type I, comprehensive security controls
CCPAData access, deletion, opt-out capabilities

Attorney-Client Privilege

For legal professionals, RedPill’s architecture protects privileged communications:
  • No third-party access - Data processed only in TEE, never exposed
  • No data retention - Conversations not stored on our servers
  • Verifiable security - Cryptographic attestation proves secure processing
  • Audit trails - Encrypted logs for compliance (Enterprise)

Legal Use Case

Learn how law firms use RedPill →

Subprocessors

RedPill uses a minimal set of trusted subprocessors:
SubprocessorPurposeData Access
Cloud ProviderInfrastructureEncrypted data only
StripePayment processingBilling info only
AnalyticsUsage metricsAnonymized only
We do not share user prompts or conversations with any subprocessor.

Requesting Compliance Documents

For enterprise customers and prospects, we provide:
  • SOC 2 Type I Report
  • Security questionnaire responses
  • Penetration test summaries
  • Data Processing Agreement (DPA)
  • Business Associate Agreement (BAA)

Trust Center

Visit our Trust Center for:
  • Real-time system status
  • Security advisories
  • Compliance updates
  • Incident history

Trust Center

View Trust Center →