LeakTrace Trust Centre

Security. Privacy.
Documented.

Our security architecture, compliance posture, data handling practices, and privacy commitments — transparently published in one place. No request required.

Current Compliance Status
PIPEDA Compliant Active
CCPA / CPRA Compliant Active
AES-256 Encryption Active
Data Stays in North America Active
Zero PII Post-Assessment Active
SOC 2 Type II In Progress
Compliance & Certifications

What We Are Certified For.

Our compliance posture covers Canadian and US privacy law, encryption standards, and data residency requirements applicable to every individual and business client we serve.

Active
PIPEDA

Personal Information Protection and Electronic Documents Act — the federal privacy law governing how private-sector organisations in Canada collect, use, and disclose personal information. All LeakTrace data processing is fully compliant.

Active
CCPA / CPRA

California Consumer Privacy Act and California Privacy Rights Act compliance for all US-resident users. Includes full right-to-deletion, opt-out of data sale, and disclosure rights.

Active
AES-256 Encryption

All data at rest is encrypted using AES-256. All data in transit is secured using TLS 1.3. Encryption keys are managed using industry-standard key management systems with no shared keys.

Active
North American Data Residency

All data processing, storage, and compute occurs within Canada and the United States. No data is transferred to, processed in, or accessible from outside North America.

Active
Zero PII Retention

Personal identifiable information provided during a scan is not retained after report delivery. No user profiles. No persistent databases of scan subjects. We find your exposure — we do not become part of it.

In Progress
SOC 2 Type II

SOC 2 Type II audit covering Security, Availability, and Confidentiality trust service criteria is currently in progress. Expected completion in Q3 2026. Documentation available to enterprise clients on request.

Security Architecture

How We Protect the Platform.

The technical and operational controls that govern how LeakTrace systems are built, operated, and monitored.

01
Authentication
Multi-Factor Authentication & Access Controls

All internal system access requires multi-factor authentication. Role-based access controls restrict data access to the minimum required for each function. No standing administrative privileges — privileged access is just-in-time and fully logged.

02
Infrastructure
Isolated Production Environment

Production infrastructure is isolated from development and staging environments. All configuration changes are code-reviewed and deployed through automated pipelines. Unauthorised changes to production are automatically detected and escalated.

03
Encryption
End-to-End Encryption at Rest and in Transit

AES-256 encryption at rest for all stored data. TLS 1.3 for all data in transit. Encryption keys are managed separately from encrypted data with automated rotation policies. No plaintext storage of sensitive identifiers.

04
Monitoring
Continuous Logging & Anomaly Detection

All system activity is logged to a centralised security data lake. Automated detection pipelines identify anomalous access patterns and potential security events. Alerts are routed to on-call engineers with defined response SLAs.

05
Development
Secure Development Lifecycle

All code changes undergo peer review before deployment. Automated secret scanning, dependency vulnerability scanning, and static analysis run on every commit. Security reviews are required for all feature changes that touch data handling.

06
Testing
Penetration Testing & Third-Party Audits

External penetration testing is conducted annually by independent third-party security firms. Findings are remediated on a defined timeline based on severity. Audit reports are available to enterprise clients under NDA.

Data Handling

What We Do With Your Data.

A precise statement of what data is collected, how long it is retained, and what happens to it after your scan or assessment is complete.

Scan Subject Data

Email addresses and domain inputs used to run a scan are not retained after report generation. We process them to query breach databases — we do not store them permanently.

Report Contents

Delivered reports are accessible via the dashboard for the duration of an active subscription. On cancellation, report data is deleted within 30 days. You may request immediate deletion at any time.

Account & Contact Information

Name, email, and payment information required to operate your account. Payment data is processed by Stripe and never stored on LeakTrace systems. Account data is deleted on cancellation within 30 days.

Usage & Analytics

Anonymised usage data is collected to improve the platform. No user-identifiable information is included in analytics. Data is never sold or shared with third parties for advertising purposes.

Disclosure & Resources

Reporting & Documentation.

How to report a vulnerability, request compliance documentation, or exercise your privacy rights.

Responsible Disclosure
Report a security vulnerability in LeakTrace infrastructure or products

If you have identified a potential security vulnerability in any LeakTrace system, please contact our security team directly. We commit to acknowledging your report within 24 hours and providing a remediation timeline within 5 business days. We do not pursue legal action against good-faith researchers.

[email protected]
Compliance Documentation
Request security certificates, audit reports, or compliance attestations

Enterprise clients may request copies of our security documentation including penetration test summaries, compliance attestations, and data processing agreements. Documentation is shared under NDA. Contact us to initiate a request.

Request Documentation
Privacy Rights Requests
Exercise your PIPEDA or CCPA rights — deletion, access, or opt-out

You may request access to, correction of, or deletion of any personal information LeakTrace holds about you. Requests are processed within 30 days. To opt out of communications, email us or reply STOP to any SMS.

[email protected]
Security Standards
Full technical security documentation and policy statements

Our public Security Standards page documents the full set of controls, policies, and procedures that govern the LeakTrace platform — written for technical and compliance audiences.

Read Security Standards
Changelog

Recent Trust & Security Updates.

Material changes to our security posture, compliance status, or privacy practices — documented as they occur.

Mar 2026
SOC 2 Type II Audit Initiated

Engaged an independent third-party auditor to begin SOC 2 Type II assessment covering Security, Availability, and Confidentiality trust service criteria. Expected completion Q3 2026.

In Progress
Feb 2026
TLS 1.3 Enforced Across All Endpoints

Upgraded all production endpoints to enforce TLS 1.3. TLS 1.0 and 1.1 deprecated and blocked. All traffic now uses HSTS with a 1-year max-age.

Completed
Jan 2026
Zero PII Retention Policy Implemented

Scan subject data (email addresses and domain inputs) is now automatically purged from all systems within 24 hours of report delivery. Retention policy documented and auditable.

Completed
Dec 2025
CCPA / CPRA Compliance Review Completed

Full legal review of data processing practices against CCPA and CPRA requirements completed. Privacy policy updated to reflect new consumer rights disclosures. Data deletion workflow implemented.

Completed
Nov 2025
Production Environment Penetration Test

Annual external penetration test completed by independent third-party firm. All critical and high findings remediated within 30 days. Report available to enterprise clients under NDA.

Completed