Trust & Security
SigSlayer is designed to help teams respond to security questionnaires efficiently while maintaining strong security, privacy, and data protection practices.
This page provides an overview of our approach to security and compliance. Detailed legal terms and policies are available on our Legal page.
Security by Design
SigSlayer is built with security as a foundational requirement, not an afterthought.
We follow industry-standard security principles, including:
- Least-privilege access
- Logical tenant isolation
- Defense-in-depth
- Secure-by-default configurations
Security controls are implemented across application, infrastructure, and operational layers.
Data Protection & Privacy
SigSlayer is established in Sweden and operates in accordance with applicable data protection laws, including the GDPR.
Key principles:
- We process customer data only on customer instructions
- Customer content is not used to train shared or public AI models
- We do not sell personal data
- Access to customer data is restricted to authorized personnel only
Our data protection commitments are documented in our Enterprise Addendum (DPA + EU SCCs).
AI Usage & Safeguards
SigSlayer uses AI to assist with analyzing and drafting responses to security questionnaires.
Important safeguards:
- AI features are assistive, not authoritative
- Outputs require human review before use
- Customer content is processed only within the customer’s workspace
- Customer data is not used to train shared or public AI models
Customers remain responsible for validating all generated outputs.
Infrastructure & Hosting
SigSlayer leverages reputable cloud service providers to operate the service.
- Primary hosting and processing occurs in the United States
- Data transfers are safeguarded using EU Standard Contractual Clauses where required
- Subprocessors are subject to contractual security and data protection obligations
A current list of authorized subprocessors is available on our Legal page.
Access Controls & Authentication
We implement controls to limit access to systems and data, including:
- Role-based access controls
- Authentication and authorization mechanisms
- Segregation of customer environments
- Logging and monitoring of system access
Access is granted only to individuals with a legitimate business need.
Monitoring, Logging & Incident Response
SigSlayer maintains monitoring and logging to detect and respond to security events.
- System activity is logged for security and operational purposes
- Alerts are used to identify anomalous behavior
- Incidents are handled through defined response procedures
In the event of a personal data breach, customers are notified in accordance with applicable law and contractual obligations.
Supplier & Subprocessor Management
Third-party service providers are assessed using a risk-based approach.
- Subprocessors are selected based on security and reliability considerations
- Data protection obligations are contractually enforced
- Subprocessor access is limited to what is necessary to provide the service
See the Subprocessor List for current providers.
Compliance & Standards Alignment
SigSlayer aligns its security and operational practices with widely recognized standards, including:
- SOC 2 security principles
- ISO/IEC 27001 control objectives
- GDPR data protection requirements
Formal certifications or reports may be made available under NDA or upon request where applicable.
Responsible Use
Use of the SigSlayer service is governed by our Acceptable Use Policy.
We prohibit misuse, misrepresentation, and unlawful activity.
Customers are responsible for ensuring that use of the service complies with applicable laws and contractual obligations.
Transparency
We believe transparency builds trust.
Our legal and data protection documentation is publicly available:
- Terms of Service
- Privacy Policy
- Enterprise Addendum (DPA + EU SCCs)
- Subprocessor List
- Acceptable Use Policy
Visit the Legal page for full documentation.
Contact
For security, privacy, or trust-related inquiries, contact:
SigSlayer
Email: legal@sigslayer.com