Data handling

Client data ownership

PROVEN operates as a data processor, not a data controller. Client data belongs to the client. PROVEN holds read-only access rights, revocable at any time.

Encryption

In transit and at rest

All client data is encrypted in transit and at rest using industry-standard protocols. Infrastructure is built on enterprise-grade cloud providers with institutional security certifications.

Access control

Tenant isolation

Client data is isolated at the architectural level, not policy level. Access is logged, role-scoped, and auditable. No cross-client data exposure by design.

Certifications in progress

PROVEN is actively pursuing the certifications institutional investors require of their financial-data vendors. Current status:

SOC 2 Type I

Independent attestation of security controls at a point in time.

On roadmap

SOC 2 Type II

Independent attestation of security controls sustained over time.

Roadmap · target 2027

ISO 27001

International standard for information security management systems.

Roadmap

GDPR

EU data protection regulation compliance.

DPA template available

CCPA

California Consumer Privacy Act data handling.

Compliant from day one
Full security package

For engagements in active discussion.

A complete security and architecture overview — including infrastructure documentation, data-handling practices, sub-processor list, and DPA — is available under NDA for institutional investors actively evaluating PROVEN.