Security

Learn about our comprehensive security measures designed to protect your research data and maintain your privacy.

Last updated: June 3, 2025

Security Overview

Security is fundamental to Datarag's design. We implement multiple layers of protection to ensure your research data remains private, secure, and under your control. Our security framework follows industry best practices and is regularly audited by third-party security experts.

Data Protection

Encryption

  • AES-256 encryption for all data at rest
  • TLS 1.3 for all data in transit

Privacy by Design

  • User consent and control
  • Minimal data collection

Infrastructure Security

Cloud Infrastructure

Render Security

  • • SOC 2 Type II certified
  • • ISO 27001 compliant
  • • 99.9% uptime SLA

Network Security

  • • DDoS protection
  • • Multi-layer firewall
  • • VPC isolation

Monitoring

  • • 24/7 security monitoring
  • • Suspicious activity detection
  • • Alerting

Access Control

Authentication

  • Multi-factor authentication (MFA) support
  • OAuth 2.0 and SSO
  • Session management and timeout

Authorization

  • Role-based access control (RBAC)
  • Principle of least privilege
  • Regular access reviews

Compliance & Certifications

GDPR

GDPR Compliant

Full compliance with European data protection regulations

Incident Response

24/7 Security Response

Our security team monitors for threats around the clock and has established procedures for rapid incident response.

Less than 1 hour
Detection Time
Less than 4 hours
Response Time
Less than 24 hours
User Notification
100%
Transparency

Security Contact

If you discover a security vulnerability or have security-related questions, please contact our team:

📧
support@datarag.ai
🔐
PGP Key: Available upon request

Responsible Disclosure: We appreciate security researchers who report vulnerabilities responsibly. We commit to acknowledging reports within 24 hours and providing regular updates on our investigation.