Trust Center
Transparency is not optional when you process device signals at scale. Here is everything you need to evaluate tracio.ai's security posture.
Security Architecture
Encryption Architecture
Device identification signal payloads are encrypted end-to-end before transit, then wrapped in AES-256-GCM for transport. At rest, all visitor data is encrypted with AES-256. API keys are bcrypt-hashed and never stored in plaintext.
Privacy by Architecture
tracio.ai collects device signals, not personal data. All signals are hashed client-side using one-way hashing before transmission. No names, emails, browsing history, or cross-site tracking. Visitor IDs are one-way hashes that cannot be reversed.
Data Sovereignty
Choose EU or US data residency at account creation. Visitor data never leaves your selected region. No cross-region replication, no third-party data sharing, no secondary data monetization. You own every byte.
Access Control
Least-privilege RBAC with scoped API keys, IP allowlisting, and mandatory MFA for admin accounts. Enterprise plans include SSO/SAML integration with Okta, Auth0, and Azure AD.
Audit Trail
Comprehensive audit logging covers every API call, configuration change, key rotation, and admin action. Logs are immutable, exportable, and retained for 12 months. Enterprise plans include SIEM integration.
Incident Response
24/7 automated monitoring with PagerDuty escalation. Documented incident response runbooks with severity classification (P0-P3). Mean time to acknowledge: 5 minutes. Mean time to resolve: 2 hours.
Certifications & Compliance
SOC 2 Type II
CertifiedAnnual audit covering security, availability, and confidentiality
Last: January 2026
GDPR
CompliantFull compliance with EU General Data Protection Regulation
Last: Ongoing
CCPA
CompliantMeets California Consumer Privacy Act requirements
Last: Ongoing
ISO 27001
In ProgressInformation security management system certification
Last: Q2 2026
Available Documents
Request any document below by contacting security@tracio.ai
Data Processing Agreement (DPA)
Legal
SOC 2 Type II Report
Audit
Penetration Test Summary
Security
Privacy Impact Assessment
Privacy
Subprocessor List
Legal
Security Whitepaper
Technical
Need More Detail?
Our security team is available for calls, questionnaire completion, and custom compliance reviews.