Security & Compliance
Enterprise-grade security for your data.
At Pyronets, data security isn't an afterthought — it's foundational to everything we do. We implement industry-leading security practices to ensure your data is protected at every stage of the extraction pipeline.
SOC 2 Type II Compliant
Our systems and processes are audited annually to meet SOC 2 standards for security, availability, and confidentiality.
GDPR Compliant
We only collect publicly available data and comply with all applicable data protection regulations including GDPR and CCPA.
End-to-End Encryption
All data transfers use TLS 1.3 encryption. Data at rest is encrypted using AES-256. API keys are stored in hardware security modules.
Built on secure infrastructure
Cloud Security
Deployed on ISO 27001-certified cloud infrastructure with automated security patching, network isolation, and DDoS protection.
Access Control
Role-based access controls, multi-factor authentication, and principle of least privilege across all systems and personnel.
Monitoring & Logging
24/7 security monitoring, comprehensive audit logging, and automated threat detection with incident response procedures.
Data Handling Practices
- Data minimization — we only collect the specific data points you request
- Retention policies — data is retained only as long as needed for your project
- Secure deletion — data is securely wiped from our systems upon project completion or your request
- No third-party sharing — your data is never shared with or sold to third parties
- Vulnerability management — regular penetration testing and vulnerability assessments
Compliance & Certifications
- SOC 2 Type II certified
- GDPR compliant
- CCPA compliant
- ISO 27001 aligned practices
- Regular third-party security audits
Responsible Scraping
Pyronets follows ethical scraping practices: we only extract publicly accessible data, respect robots.txt guidelines, implement polite crawl rates, and comply with all applicable laws and regulations. Our legal team provides guidance on compliance for specific use cases.