Contact us

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Trust Center

Discover details of our data security and privacy practices, built on industry standards and validated through external certifications.

Certifications & Attestations

SOC 2 Type II
ISO 27001: 2023
Cyber Essentials
SSIP Acclaim H&S
Constructionline Gold Member

Core Security Controls

Access Controls


Access is governed through the Principle of Least Privilege, supported by MFA and SSO. Reviews and control procedures ensure that access is adjusted as roles evolve or staff departs.

Encryptions

Data in transit is protected using TLS v1.2 over HTTPS and VPN. Sensitive information, credentials, and tokens are stored in a secure vault & encrypted using a combination of BCrypt, PBKDF2 and AES algorithms.

Secure Development

All code changes are peer-reviewed, tested, and approved before merging. Vulnerability scans, system reviews and penetration tests ensure resilience and system stability.

Incident Readiness

Data is regularly backed up, ensuring its availability and integrity against system failures or loss. Tested incident response, business continuity and disaster recovery plans keep us prepared for potential threats.

Proactive Monitoring

Logging and monitoring tools like Grafana, Sentry and Posthog provide operational visibility, enable rapid troubleshooting, and facilitate continuous improvement.

Trusted Infrastructure

The underlying infrastructure is built on SOC 2 and ISO 27001-certified cloud services. Regular audit of our partners and their systems ensures compliance from the ground up.

Your Privacy is our Priority

Privacy isn’t just a feature, it’s a foundation. We design every tool, workflow, and integration with a deep respect for your data. Here’s how we ensure trust is built into every layer of our platform.

For more details about our data protection practices, visit our GDPR Commitment and FAQs.

Trustworthy & Transparent

Our security practices are built on industry standards and consistently validated through regular internal, external, and third-party assessments.

You’re in Control

Your data, your rules. As the owner, you define how your data is used and we simply follow your lead. No processing, access, or storage happens outside your instructions. We tailor data retention to your needs and promptly delete data upon request.

Cultivating a Security-Aware Culture

We provide regular security trainings for all employees, fostering a culture of vigilance and responsibility to ensure adherence to best practices and policies.

Adhering to Global Regulatory Frameworks

We actively monitor and adapt our privacy programs to comply with evolving data protection regulations, demonstrating commitment to legal & ethical data handling.

For Further Queries

Reach out to our Security Team

Refer to our GDPR Commitment & FAQs

Built on Security and Reliability

Request a demo and see how Evercam protects your project data with enterprise-grade security and compliance standards.