Menu
ResourcesPricingContact

Security & Compliance

Learn about Concord's security measures, compliance certifications, and data protection practices. SOC 2, GDPR, HIPAA compliant.

Security & Compliance

Your contracts contain your most sensitive business information. We take protecting it seriously.

Certifications & Standards

Concord provides a SOC 2 Type II report. This report can be accessed through our Conveyor portal.

Concord values your privacy. You can choose where your data is stored, and also have the option to enter into a Data Processing Agreement.

Industry-Leading Certifications

SOC 2 Type II

SOC 2 Type II Certified

Annual audits verify our security controls meet the highest industry standards.


Cloud Security Alliance Star

Cloud Security Alliance Star Level One

Concord has received a Star Level One rating from the Cloud Security Alliance — the highest transparency rating.


Data Privacy Framework

Data Privacy Framework (DPF)

The DPF enables U.S. organizations to transfer personal data from the EU, UK, and Switzerland in line with privacy laws. Concord is certified under the EU-U.S. DPF and its UK and Swiss extensions.


AWS Compliance

AWS Compliance

Concord's servers are hosted on AWS, in compliance with SOC 1, SOC 2, SOC 3, ISO 27x, FedRamp, PCI DSS, HIPAA, FIPS, FISMA, and CSA.


eIDAS Compliant

eIDAS Compliant Signatures

Our e-signatures comply with eIDAS, UETA and the eSign Act. Legal in more than 150 countries worldwide.

Application Security

Data Storage & Infrastructure

Concord stores all content in geographically dispersed, ISO 27001-certified and SSAE 16-audited data centers throughout the United States and Europe. These data centers include state-of-the-art physical and environmental access controls and safety features.

Encryption

All data in Concord is encrypted in transit and at rest. We use TLS 1.2 or higher for data in transit, and banking industry standard AES-256 encryption for data at rest.

Access Management

Concord employees only have access to customer data on a strict need-to-know basis. Customers have granular access management with complex passwords, SSO, and two-factor authentication (2FA).

Redundancy & Backups

Concord uses redundant geo-dispersed servers; we can adjust their capabilities in real-time depending on the current load. In addition to data replication, automated full daily backups prevent any data loss. All backups are encrypted.

Monitoring & Incident Management

Concord's infrastructure provides security and application monitoring and alerts. Concord has a strict incident management policy in place, in case of a critical alert.

Security Testing

Concord performs bi-annual external penetration testing as well as daily internal scans. Concord follows SDLC principles, and addresses any identified vulnerabilities based on a well-defined vulnerability management policy.

Third-Party Security

Concord only uses third-party subprocessors after performing careful due diligence. We perform an annual review of all our subprocessors.

Payment Security

Concord uses a PCI Data Security Standard (PCI DSS) Level 1 provider to process payments, maintaining a secure environment for all transactions.

AI & Data Privacy

Concord's Agreement Intelligence enables automated extraction of key information with AI. Concord's AI provider has signed an agreement that requires them to adhere to a zero data retention policy. No customer data is used for AI model training.

Product Security Features

Identity & Two-Factor Authentication

In Concord, administrators can create as many user roles and categories as are required by their organization's workflow. Admins can grant rights on a feature-by-feature basis, and control the types of documents that each user can view — ensuring that only authorized individuals can access designated contracts, or confidential and sensitive documents, while admins maintain granular control over their data. You can set up SSO and 2FA for your employees.

Electronic Signatures

Concord's e-signatures comply with eIDAS, UETA and the eSign Act. Our e-signatures are legal in more than 150 countries (and counting), and comply with regulations throughout the world. After you sign a document, you can easily download an e-signature certificate that will be valid forever.

Audit Trail

The audit trail logs all of the activity that occurs in a document, including the date, time, and the person who performed each action. It will continue to record actions taken in a document even after it has been signed. This includes invitations, changes to the lifecycle dates, and termination of the document. The audit trail and documents cannot be tampered with. This will be particularly important if you ever have to present court-admissible evidence.

Questions about security?

Our security team is here to help with any questions or concerns.

Contact: security@concord.app

Ready to streamline your contracts?

See how Concord can help your team work faster and smarter.