Trust & Security

Built for Enterprise Security

Propeter is designed from the ground up for enterprise-grade security, privacy compliance, and operational resilience. Every data decision starts with trust.

Certifications & Standards

Our compliance posture across key international frameworks.

🛡️
ISO 27001
In Progress

Controls implemented. Formal audit targeted Q4 2026.

🔏
GDPR (EU/UK)
Compliant

DPA, SCCs (Module 2), sub-processor list, right-to-erasure workflows.

🇮🇳
DPDP Act 2023
Compliant

India Digital Personal Data Protection Act. Full consent framework implemented.

🌏
Australian APPs
Compliant

Privacy Act 1988 (Cth) Australian Privacy Principles compliance.

🇺🇸
CCPA (California)
Compliant

California Consumer Privacy Act. Data rights request portal available.

💳
PCI DSS
Via Partner

Payment processing handled by PCI-DSS Level 1 certified partners (Windcave / Qvalent). Propeter never stores raw card data.

📋
SOC 2 Type II
Roadmap 2027

Security, Availability, and Confidentiality trust service criteria. Audit scoped for 2027.

🏨
PII Encryption
Active

AES-256 at rest, TLS 1.3 in transit. Guest PII field-level encrypted.

Compliance Matrix

Region-by-region compliance coverage for enterprise procurement teams.
RequirementIndiaEU / UKAustraliaUSA (California)
Data Processing AgreementAvailableAvailableAvailableAvailable
Standard Contractual ClausesN/AModule 2 signedAvailableAvailable
Right to Erasure / DeletionSupportedSupportedSupportedSupported
Data PortabilityJSON/CSV exportJSON/CSV exportJSON/CSV exportJSON/CSV export
Sub-processor DisclosureList publishedList publishedList publishedList published
Breach Notification72h (DPDP)72h (GDPR)NDB Scheme72h CCPA
Data Residency OptionIndia (Mumbai)EU region roadmapAU region roadmapAWS US East (shared)
Penetration TestingAnnual third-party pentest. Results available under NDA.

Security Documentation

Download or review our full security and privacy documentation pack.

Security Overview

Executive summary of Propeter’s security program, controls, and risk management approach.

View Document

Security Architecture

7-layer infrastructure security diagram. Network segmentation, WAF, IDS/IPS, and zero-trust principles.

View Document

Encryption Standards

AES-256 at rest, TLS 1.3 in transit, field-level PII encryption, HSM key management.

View Document

Backup & Recovery Policy

RPO 4h / RTO 8h targets, daily automated backups, geo-redundant replication, retention schedules.

View Document

Disaster Recovery Plan

Full DR runbook — failover procedures, escalation matrix, test schedule, and RTO commitments.

View Document

Uptime SLA

99.9% uptime commitment, measurement methodology, credit schedule, maintenance windows.

View Document

Privacy Policy

Full data collection, usage, retention, and sharing disclosure for all jurisdictions.

View Document

Data Processing Agreement

GDPR-compliant DPA covering controller/processor obligations, SCCs, and sub-processors.

Download DPA

Cookie Policy

What cookies we set, why, and how to manage your preferences.

View Document

Security Contacts

Report vulnerabilities responsibly or reach out to our security and privacy teams directly.
🔐

Security Team

Vulnerability disclosure, security assessments, NDA requests for pentest reports.

security@propeter.com

🔏

Data Privacy (DPO)

Data subject requests, DPA queries, sub-processor list, GDPR / DPDP compliance queries.

privacy@propeter.com

We follow responsible disclosure. Please allow 5 business days for triage on reported vulnerabilities. Critical issues are acknowledged within 24 hours.