DeepTap

Trust & Security

Security posture, compliance roadmap, data retention policy, and third-party subprocessors. Report version 2026-04, last updated 2026-04-22.

Compliance

SOC 2 Type I

In Progress

Target: 2026 Q4

SOC 2 Type II

In Progress

Target: 2027 Q3

GDPR

Compliant

DPA available on request at privacy@deeptap.ai

DMCA / 512

Compliant

Takedown, counter-notice, and reinstate flow is live.

Security

Transport encryptionTLS 1.3
Encryption at restAWS KMS
Prompt injection firewall layers3
Vulnerability disclosuresecurity@deeptap.ai
Acknowledgement SLA24 hours

Data Retention

CategoryDurationNotes
Search queries90 daysUsed for quality tuning; deleted on request
Extracted page content30 daysCache layer only; not stored after TTL
API keys (hashed)Until revokedOnly SHA-256 hash stored, never plaintext
Usage / billing records7 yearsRequired for financial compliance
Audit logs1 yearSecurity and compliance audit trail

Subprocessors

Third-party services that process data on behalf of DeepTap.

ProcessorCategoryLocationPurposeDPA
Amazon Web ServicesCloud infrastructureUS East, EU DublinCompute, storage, KMS encryptionView
CloudflareCDN / DDoS protectionGlobalEdge caching and DDoS mitigation for API endpointsView
StripePayment processingUSSubscription billing and invoice generationView
OpenRouterLLM inferenceUSLLM calls for fact extraction and research synthesisView
BetterStackUptime monitoringUS / EUAPI uptime monitoring and incident alertingView
PostHogProduct analyticsUS / EUDashboard usage analytics (no query content)View