Skip to main content
All CollectionsGeneral
Veryfi Shield Protection
Veryfi Shield Protection

When you see the Veryfi Shield you know you are in good hands

Updated over a week ago

Veryfi Shield: Bank-grade security and compliance

Veryfi Shield protects your data and your business

Veryfi Shield is a data privacy commitment and guarantee to you that all data processing is safe and secure.

🛡️ SOC2 Type2 Certified

Veryfi’s SOC2 Type2 report outlines how Veryfi safeguards customer data and how well those controls are operating. More

🛡️ Industry Encryption Standards

Veryfi employs TLS1.2 & 1.3, Salted Password Hashing, AES at Rest & In-Transit. NIST ISO used for keeping audit.

🛡️ GDPR, HIPAA and CCPA Compliant

Veryfi will sign BAA upon request where Healthcare PHI is handled by Veryfi.

🛡️ GovCloud Option

Federal Customers can opt in for Veryf’s GovCloud offering that’s CMMC compliant or on-prem solution.

🛡️ Independant PEN Testing

Performed regularly by Synopsys NPS (NASDAQ), an independent software security and quality company.

🛡️ No Humans-in-the-Loop

Veryfi’s is machines all the way down. This means data privacy, superior accuracy, and lots and lots of data in seconds.

Using Veryfi, the processing of your data is SAFE.

Veryfi Shield protects your Personally identifiable information (PII) by not exposing your data to any Human-in-the-loop (HITL) or offshore extraction teams. Such practices are unfortunately all too common with other providers where unstructured documents are converted to data. It’s a hard problem to solve. At Veryfi we have solved this using machines end-to-end with accuracy and speeds that surpass human intervention.

Demand the best. Data privacy is a right.

The upcoming US Privacy laws

State-level momentum for comprehensive privacy bills is at an all-time high after the California Consumer Privacy Act passed in 2018, multiple states proposed similar legislation to protect consumers in their state through transparency. How customer data is handled is the pinnacle of these bills.

Additional reading

Did this answer your question?