← home
TRUST

Security & data handling.

Last updated: 24 April 2026

We're an early-stage firm. We don't have SOC 2 yet. Here's exactly what we do — and don't do — with your data, written plainly so you can decide if it's enough for your security review.

Honest baseline: read-only access by default · no prompt or output content stored · NDA + DPA signed before any data exchange · SOC 2 Type II is on the roadmap, not in hand.

1. What we touch

2. What we don't touch

3. How we handle credentials

4. Where data lives

5. Sub-processors

We disclose every sub-processor in the DPA. Current list (subject to change with notice):

Cloud hostingAWS (us-east-1 / eu-west-1)
EmailGoogle Workspace
Analytics (this site)Google Analytics 4 / Tag Manager
PaymentsStripe

6. Compliance

7. Reporting a vulnerability

Email [email protected]. We acknowledge within 2 business days. See also /.well-known/security.txt.

8. Incident response

Security incidents involving customer data are disclosed to affected customers within 72 hours of confirmation. Post-mortems are shared within 14 days.

← Back to llmcfo.com