Security.

Certified Authentication.

Serious About Security.

Designed around core principles of privacy, security and zero trust, Peroptyx infrastructure sets a new gold standard for data security and provenance.

Principles and Policies

Trust by Design

With ISO 27001 certified information and data management processes, a SOC-2 Type 2 certified annotation platform and qualified domain-expert resources, trust by design begins with the authentication of each individual, device and process transaction throughout the solution lifecycle.

Information Systems Security

The systems used to protect and store data are all designed for compliance with the existing GDPR, CCPA, Brazil’s LGPD and APEC Privacy Frameworks, including China’s PIPL (which came into force on November 1, 2021). The influence which these regulatory frameworks have on our systems design – given their comprehensive nature - helps Peroptyx ensure the data it manages is secured to the highest standard. All Personally Identifiable Information held and stored within our infrastructure is encrypted using reliable and trustworthy encryption techniques.

Transmission of Data

A GDPR compliant data transfer solution protects data subjects’ information transfer as well as transfer of datasets to and from customer systems. Data governance and its integrity is further underpinned by an auditing engine which captures and stores a detailed record of each transfer event.

Protection of Information Assets

An organizational cybersecurity plan utilizes several security measures and controls designed to protect and secure all information assets. These include the application of the principle of least privilege, context aware security, and centrally managed threat defence systems. There is also a strong focus on cybersecurity awareness and internal training programs are designed to equip Peroptyx employees with best-in-class cyber defence practices.  

In the face of a continuously evolving threat landscape, along with regular advisories provided by security partners, Peroptyx cybersecurity controls are regularly reviewed to ensure their continued efficacy. Peroptyx does not sell or monetize personal information in any way.

Security Assessments

As part of its program for information security, Peroptyx performs both planned and ad-hoc security assessments across its infrastructure. Assessments are conducted on a regular basis, helping to ensure cybersecurity defences remain optimized against latest known threats.

Peroptyx continuously acquires and acts on any new information that identifies a cybersecurity risk, immediately remediating any vulnerabilities which are discovered.

Retention of Personal Data

Peroptyx will retain personal data for as long as needed or permitted in light of the purpose(s) for which it was obtained and as outlined in the Peroptyx privacy policy.