How harpin AI Protects Your Customer Data

Sharing personal identity information and other first- and second-party data is an act of trust. We treat it like a high-stakes secret mission, with a dedicated security team and an ironclad program built to detect, neutralize, and obliterate potential risks — fast.

Security and Privacy - Hero

When We Say Secure Infrastructure, We Mean It (No, Really.)

harpin AI runs on Amazon Web Services (AWS) and deploys battle-tested security tools like Key Management Service (KMS), GuardDuty, and Inspector. Translation? Your data isn’t just secure — it’s Fort Knox in the cloud.

Encryption-at-Rest

Every bit of customer data we store is AES-256 encrypted, so even if all other controls failed (they won’t, but hypothetically), no unauthorized party would get through.

Encryption-in-Transit

Your data is always on lockdown, moving through modern encryption protocols (TLS 1.2, SSHv2), with real-time monitoring that catches anything sketchy before it becomes a problem.

Access Is Limited (Because Your Data Deserves VIP Treatment)

Least Privileged Access

Only the right people see the right data — no exceptions, no “oops” moments. Policies, automation, and real-time monitoring ensure access is role-based and always validated. If something seems off, our system calls it out.

Eyes on Every Activity

Every AWS access event is monitored, logged, and locked down per SOC 2 best practices. Logs are read-only, so no tampering, no funny business — just a perfect paper trail.

Security and Privacy - Harpin AI + aws graphic

We Employ Active Threat Defense (Because We’re Paranoid, So You Don’t Have to Be)

We’re not waiting for threats to happen — we actively hunt them down. harpin AI continuously monitors access patterns, ingests global threat feeds, and flags anything weird before it becomes a problem. If something doesn’t match our baselines, it gets flagged instantly — and if it’s truly suspicious, our security team is on it before you even know it’s there.

SOC 2 Type II Certified

Why does this matter? Because SOC 2 Type II certification isn’t a participation trophy — it’s a gold standard for security and compliance. It means we undergo rigorous independent audits to prove we’re continuously enforcing best practices around data security, availability, and confidentiality. We don’t just meet industry standards — we keep raising the bar.

Logo - AICPA SOC

We Use AI and ML Models Responsibly

We harness AI to generate actionable insights while prioritizing security and responsible data use. Our machine learning models are developed and run in our secure private cloud, following industry-leading security practices. When using LLMs, we minimize data sent to third-party services and ensure your customer data is handled securely throughout its lifecycle.

Subprocessors

Amazon Web Services

Services provided: Hosting and infrastructure for product services
Location: United States

Tray.io

Services Provided: Data connectors to customer systems of record
Location: United States

Slack

Services provided: Internal company communication
Location: United States

Google

Services provided: Internal company communication
Location: United States

SumoLogic

Services provided: Log aggregation and monitoring
Location: United States

Squadcast

Services provided: Incident management and alerting services
Location: United States

Atlassian

Services provided: Project management and documentation
Location: United States

iMerit

Services provided: Data labeling for training models
Location: United States

Data Controller vs. Data Processor(Where Do We Stand?)

We’re a data processor for any data sent to or stored by us. We follow a clear, well-defined process to handle GDPR, CCPA, and other consumer privacy law requests — so you don’t have to wade through legal jargon and hope for the best.

Have Security Questions? We’ve Got Answers

 Your security concerns are our priority. If something doesn’t look right, we want to know.

Contact us at security@harpin.ai — let’s lock down a secure future together.