Compliance & Certifications
AI Pipeline maintains comprehensive compliance with international regulations, industry standards, and data protection laws to ensure your trust and confidence.
Our Certifications & Compliance Status
SOC 2 Type II
ActiveGDPR
CompliantCCPA
CompliantPCI DSS
Level 1ISO 27001
In ProgressHIPAA
BAA AvailableOur Compliance Commitment
We are committed to maintaining the highest standards of regulatory compliance, data protection, and security to protect your organization and data.
Table of Contents
Compliance Overview
AI Pipeline is committed to maintaining the highest standards of compliance with international regulations, industry standards, and data protection laws. Our compliance program ensures that your data is handled securely and in accordance with applicable legal requirements.
Our Approach
- •Proactive compliance monitoring and updates
- •Regular third-party audits and assessments
- •Transparent documentation and reporting
- •Dedicated compliance and legal teams
- •Continuous improvement and risk management
Certifications & Standards
SOC 2 Type II
We maintain SOC 2 Type II certification, demonstrating our commitment to security, availability, processing integrity, confidentiality, and privacy.
- •Annual independent audits by certified firms
- •Comprehensive controls for data security
- •Continuous monitoring and improvement
- •Reports available under NDA for enterprise customers
ISO 27001 (In Progress)
We are pursuing ISO 27001 certification for information security management.
- •Systematic approach to managing sensitive information
- •Risk assessment and treatment processes
- •Information security policies and procedures
- •Expected certification completion: Q2 2025
Industry Standards
- •OWASP Top 10 security practices
- •CIS (Center for Internet Security) benchmarks
- •NIST Cybersecurity Framework alignment
- •Cloud Security Alliance (CSA) best practices
Data Protection Regulations
GDPR (General Data Protection Regulation)
Full compliance with EU data protection requirements for processing personal data.
- •Lawful basis for data processing
- •Data subject rights (access, rectification, erasure, portability)
- •Data Protection Impact Assessments (DPIAs)
- •Privacy by design and by default
- •Data Processing Agreements (DPAs) available
- •EU representative appointed
- •Breach notification within 72 hours
CCPA (California Consumer Privacy Act)
Compliance with California privacy rights and consumer data protection.
- •Right to know what data is collected
- •Right to deletion of personal information
- •Right to opt-out of data sale (we don't sell data)
- •Non-discrimination for exercising privacy rights
- •Transparent privacy notices
Other Privacy Laws
- •UK GDPR and Data Protection Act 2018
- •LGPD (Brazil's General Data Protection Law)
- •PIPEDA (Canada's privacy legislation)
- •APPI (Japan's Act on Protection of Personal Information)
Industry-Specific Compliance
PCI DSS (Payment Card Industry Data Security Standard)
For organizations processing payment information through our platform.
- •Secure payment processing infrastructure
- •Third-party payment processor compliance
- •No storage of sensitive cardholder data
- •Regular PCI compliance scans
HIPAA (Healthcare)
For healthcare customers handling protected health information (PHI).
- •Business Associate Agreements (BAAs) available
- •HIPAA-compliant infrastructure options
- •Administrative, physical, and technical safeguards
- •Audit controls and integrity controls
FedRAMP (Federal Risk and Authorization Management Program)
For U.S. government agencies and contractors.
- •FedRAMP authorization in progress
- •Government-grade security controls
- •Continuous monitoring requirements
- •Expected authorization: 2026
International Compliance
Data Residency
- •Multi-region data centers (US, EU, APAC)
- •Option to specify data storage location
- •Compliance with local data residency requirements
- •Data transfer mechanisms for cross-border transfers
Standard Contractual Clauses (SCCs)
We use EU-approved Standard Contractual Clauses for international data transfers.
- •Legally binding data protection obligations
- •Compliance with GDPR Article 46
- •Regular review and updates
- •Available in customer agreements
Privacy Shield
- •Previously certified under EU-U.S. Privacy Shield
- •Transitioned to SCCs and other mechanisms
- •Monitoring of new frameworks and regulations
Audit & Reporting
Third-Party Audits
- •Annual SOC 2 Type II audits
- •Regular penetration testing by certified firms
- •Quarterly security assessments
- •Vulnerability assessments and remediation
Internal Audits
- •Continuous compliance monitoring
- •Quarterly internal security reviews
- •Access control audits
- •Policy and procedure reviews
Compliance Reporting
- •SOC 2 reports available under NDA
- •Security questionnaire responses
- •Compliance attestations and certifications
- •Custom audit reports for enterprise customers
Transparency
- •Public security and compliance documentation
- •Regular updates on compliance status
- •Incident disclosure and reporting
- •Open communication with customers
Vendor & Subprocessor Management
Vendor Due Diligence
- •Security assessments for all vendors
- •Compliance verification and documentation
- •Regular vendor risk reviews
- •Contractual security and privacy obligations
Subprocessor List
We maintain a list of subprocessors who may access customer data.
- •Cloud infrastructure providers (AWS, Google Cloud)
- •AI/ML service providers (Anthropic Claude)
- •Analytics and monitoring tools
- •Customer notification of subprocessor changes
Data Processing Agreements
- •DPAs with all subprocessors
- •GDPR-compliant data processing terms
- •Security and confidentiality obligations
- •Regular compliance verification
Compliance Training & Awareness
Employee Training
- •Mandatory security and compliance training for all employees
- •Role-specific compliance training
- •Annual refresher courses
- •Regular security awareness updates
Policies & Procedures
- •Comprehensive security policies
- •Data handling procedures
- •Incident response procedures
- •Business continuity and disaster recovery plans
Customer Resources
- •Compliance documentation and guides
- •Security best practices
- •Integration security guidelines
- •Dedicated compliance support team
Need Compliance Documentation?
Enterprise customers can request SOC 2 reports, security questionnaires, DPAs, BAAs, and other compliance documentation.
Compliance Team: [email protected]
General Inquiries: [email protected]
Related: Security Policy • Privacy Policy • Terms of Service