ContractSpec
DocsPricingSecurity / Trust
ENFRES
Start freeSign in

ContractSpec

Turn meetings and product signals into approved work with visible review, approvals, and exports that fit your existing stack.

© 2026 ContractSpec Studio.

Product

OverviewMeeting-to-ExecutionPublic SignalsMission ControlIntegrations

Resources

Expansion PathWhy Fragmented Tools Break Operators

Company

DocsPricingSecurity / TrustWatch 90-sec demo

Legal

TermsPrivacyDPA

Contact

hello@contractspec.studioLinkedInSign in
© 2026 ContractSpec Studio. All rights reserved.
ENFRES
TermsPrivacyDPA

Enterprise trust

Security Review Kit

Everything your security, legal, and procurement stakeholders need to review the current certified core wedge quickly.

Included in the kit

  • Security controls summary (auth, encryption, audit trail, retention)
  • Data handling overview (PII redaction, deletion workflow, residency options)

Procurement workflow

  • Security questionnaire response in <= 48 business hours
  • DPA and privacy references for legal review

Recommended review order

  • 1. Security posture and controls
  • 2. DPA and sub-processors
Security controlsDPA and sub-processorsPrivacy policy

Included in the kit

Procurement-ready security summary: controls, data handling, sub-processors, and questionnaire workflow.

Recommended review order

  • 1. Security posture and controls
  • 2. DPA and sub-processors
  • 3. Privacy and retention policies
  • 4. Live review call for open questions

Included in the kit

  • - Security controls summary (auth, encryption, audit trail, retention)
  • - Data handling overview (PII redaction, deletion workflow, residency options)
  • - Sub-processor registry and transfer mechanism references

Procurement workflow

  • - Security questionnaire response in <= 48 business hours
  • - DPA and privacy references for legal review
  • - SOC 2 Type I report available under NDA

Recommended review order

  • - 1. Security posture and controls
  • - 2. DPA and sub-processors
  • - 3. Privacy and retention policies
SOC 2 Type I — Available under NDA

Type II audit in progress. Request the report for your security review.

Request report
EU-first data residency

Database, storage, and analytics all hosted in EU regions. Optional EU-only AI inference on Enterprise plan.

Platform sub-processors

Core infrastructure providers that process data as part of normal operations.

ProviderPurposeRegion
VercelHosting, serverless functionsConfigurable
SupabaseManaged PostgreSQL databaseEU (eu-west-1)
PostHogProduct analytics, feature flagsEU
View full sub-processor list

Security FAQ

Where is my data stored?
Primary database in EU (Supabase EU region). Object storage in EU (GCS europe-west1). No data leaves the EU unless you configure a non-EU inference provider.
Is data encrypted?
Yes. AES-256 at rest, TLS 1.3 in transit. API tokens encrypted with workspace-scoped keys.
How is PII handled?
Automatic PII redaction (emails, phones, names) before feedback is stored. Configurable per source.
PII redactionRetention controlsNo raw audio stored
Learn more

Send your questionnaire and timeline

We reply quickly and keep the review trail explicit for every stakeholder.

Email security team Open DPA