Security & Compliance
Your financial data deserves the highest level of protection. We've built Tax Lens with security at its core.
How We Protect Your Data
Multiple layers of security ensure your financial information is always protected.
End-to-End Encryption
All data is encrypted using AES-256 at rest and TLS 1.3 in transit, ensuring your financial information remains protected at every stage.
SOC 2 Type II Certified
Our infrastructure and processes are independently audited and certified to meet the rigorous SOC 2 Type II security standards.
Multi-Factor Authentication
Protect your account with MFA options including authenticator apps, SMS, and hardware security keys.
Zero-Knowledge Architecture
Our AI processes your data without human access. Only you and your authorized team can view sensitive financial information.
Role-Based Access Control
Granular permissions ensure team members only access the data and features necessary for their role.
Comprehensive Audit Logs
Every action is logged and traceable, providing complete visibility into who accessed what and when.
Certifications & Compliance
We maintain the highest standards of security and regulatory compliance.
SOC 2 Type II
CertifiedAnnual audit of security controls
ISO 27001
CertifiedInformation security management
GDPR
CompliantEU data protection regulation
CCPA
CompliantConsumer privacy rights
HIPAA
CompliantHealthcare data protection
PCI DSS
Level 1Payment card security
Infrastructure Security
Cloud Infrastructure
Hosted on AWS with multi-region redundancy. Data centers are SOC 2 certified with physical security, biometric access, and 24/7 surveillance.
Network Security
Enterprise-grade firewalls, DDoS protection, intrusion detection systems, and network segmentation protect against external threats.
Data Isolation
Each customer's data is logically isolated with dedicated encryption keys. No cross-tenant data access is possible.
Backup & Recovery
Automated daily backups with point-in-time recovery. Backups are encrypted and stored in geographically separate locations.
Our Security Practices
Development Security
- Secure SDLC with code reviews
- Automated vulnerability scanning
- Dependency security monitoring
- Regular penetration testing
Operational Security
- 24/7 security operations center
- Incident response procedures
- Employee security training
- Background checks for all staff
Responsible Disclosure
We take security seriously and appreciate the work of security researchers. If you discover a vulnerability, please report it responsibly.
Have Security Questions?
Our security team is available to discuss your specific requirements and compliance needs.
Contact Security Team