Least access by default
No engineer has standing access to customer data in production. Access is granted per-incident, time-boxed, logged, and reviewed.
SoftSight sits in the middle of decisions that shape products, medicine, and public policy. If we don’t protect the data passing through us, we make those decisions worse. This page is how we explain — in detail, without marketing — what we actually do to keep the marketing site, the platform, and your data safe.
Security at SoftSight is not a department. It is four commitments that constrain every engineering decision we make.
No engineer has standing access to customer data in production. Access is granted per-incident, time-boxed, logged, and reviewed.
TLS 1.2+ for everything that crosses the network. AES-256 for everything that touches disk. No exceptions, no internal-only carve-outs.
We don’t roll our own hosting, our own database security, or our own crypto. We build on Vercel and major cloud providers whose security posture is mature and audited.
If we have a security incident that affects you, you find out from us, in detail, fast. Not from a third party. Not in a vague PR sentence.
If something on this page is unclear, or you need detail not covered here for a vendor security review, email security@softsight.io.
softsight.ai is a Next.js marketing site hosted on Vercel’s global edge network. There is no public database behind it, no end-user accounts, and no admin panel exposed to the internet. The attack surface is small by design.
includeSubDomains directive.The AI Project Manager (AIPM) and SurveyGuard products run separately from the marketing site, on cloud infrastructure with stronger isolation and tighter controls.
Network and infrastructure
Application security
SurveyGuard specifics
SurveyGuard’s 15 detection layers process respondent telemetry in under 200 milliseconds at the entry point of every survey. Detection thresholds are not configurable downward for commercial reasons — that commitment is also written into our Terms of Service. The reputation network is built from cross-survey signals and never identifies individual respondents to other customers.
Encryption
Backups and durability
Retention and deletion
We maintain a written incident response plan covering detection, triage, containment, eradication, recovery, and post-incident review. The plan is rehearsed at least twice a year.
We rely on a small set of named sub-processors. We’ve chosen each one because their security and privacy posture is mature, and we keep this list current alongside our Privacy Policy.
| Vendor | Purpose | Data category | Region |
|---|---|---|---|
| Vercel | Hosting, edge functions, analytics, performance vitals | Marketing-site metadata, performance vitals, request logs | US / EU |
| Formspree | Form submission relay and notification email | Form submissions from demo, beta, careers, ROI | US |
| Google (Apps Script + Sheets) | Persistent log of form submissions for internal review | Same fields as Formspree, written to a private sheet | US / EU |
| Mailchimp (Intuit) | Newsletter list management and delivery | Email address, signup source tag, status | US |
| Cloud platform (named under NDA for platform customers) | Compute, managed database, object storage, KMS | Production customer data, encrypted at rest | Region selectable per contract |
We do not sell or rent personal data, and we do not share it with advertising networks. Vendor changes are reflected here, on the Privacy Policy, and notified by email to enterprise customers in advance where contractually required.
We’re early-stage and we say so. Rather than imply certifications we don’t yet hold, here’s exactly where each one is.
| Framework | Status | Detail |
|---|---|---|
| GDPR / UK GDPR | Live | Operating model, lawful bases, data subject rights, sub-processor list, and transfer mechanisms are documented in our Privacy Policy. DPA available for enterprise customers on request. |
| India DPDP Act, 2023 | Live | We follow notice, consent, and rights obligations under India’s Digital Personal Data Protection Act. Grievance contact: privacy@softsight.io. |
| CCPA / CPRA | Live | California residents have the right to know, delete, correct, and limit sensitive personal information. We do not sell or share personal data as defined under California law. |
| SOC 2 Type I | In progress | Readiness assessment underway. Targeting report availability within 12 months of platform general availability. |
| SOC 2 Type II | Planned | Following Type I, with an observation window of at least 6 months. Target: within 24 months of platform GA. |
| ISO/IEC 27001 | Planned | Scope and gap assessment scheduled alongside SOC 2 Type II work. Pursued where enterprise procurement makes it the right next step. |
| HIPAA | Conditional | The platform is not currently designed for protected health information. We’ll re-evaluate if and when a healthcare use case requires it. |
If your procurement process needs evidence we don’t yet have a certification for — questionnaires, architecture diagrams, control mappings — write to security@softsight.io and we’ll respond with what we can share under NDA.
We welcome reports from researchers and engineers who find security issues in our systems. We will not pursue legal action against anyone who reports in good faith and follows the guidance below.
security@softsight.ioInclude a clear description of the issue, the steps to reproduce it, and any proof-of-concept (logs, screenshots, code) that helps us verify. A PGP key is available on request for sensitive reports.
We’ll acknowledge your report within 2 business days, give you an initial assessment within 5, and keep you updated through remediation.
Safe harbour
Out of scope
Recognition
We don’t currently run a paid bounty programme, but we maintain a researcher recognition list and will credit your work — with your permission — on a future security acknowledgements page. As the company grows, paid bounties will follow.
If your procurement team needs a security questionnaire filled out, an architecture diagram, or a control mapping, ask. A real engineer answers — and we’ll sign your NDA before sharing anything that needs one.