Trust & Security

Held to the Same Standard.

We Are Held to the Same
Standard We Audit You Against.

AuditPulse's infrastructure, methodology, and data practices are independently mapped against the same four frameworks we use to audit our customers. This page is updated in real time.

Last Updated: April 15, 2026
EU AI Act
Mapped & Verified
Compliant

AuditPulse's diagnostic methodology is mapped against all applicable EU AI Act articles. As a compliance tool, we operate as a General Purpose AI system with full transparency obligations met.

Citations: Art. 13, Art. 52
NIST AI RMF 1.1
All Functions Covered
Compliant

GOVERN, MAP, MEASURE and MANAGE functions are all instrumented across our diagnostic and report generation pipeline. Evidence artifacts available on request.

ISO 42001:2024
CERTIFIED METHODOLOGY
Methodology Certified

Our audit methodology was designed against ISO 42001:2024 Clause 4-10 requirements. Annual methodology review scheduled.

SOC 2 Type II
AUDIT SCHEDULED
In Progress

SOC 2 Type II audit scheduled for Q3 2026. Security, availability, and confidentiality trust service criteria implemented and monitored.

Your Data

  • - Diagnostic answers are never stored beyond report generation
  • - No PII retained after 30 days
  • - AES-256 encryption in transit and at rest
  • - Zero third-party data selling - ever

Our Stack

  • - Hosted on Vercel - SOC 2 certified
  • - Payments via Stripe - PCI DSS Level 1
  • - Email via Resend - SOC 2 certified
  • - Claude API via Anthropic - enterprise-grade security

Our Audit Logic

  • - Scoring methodology published openly
  • - Framework mappings reviewed quarterly
  • - No black-box scoring - every finding cites a specific regulatory article
  • - Methodology available for customer review on request
Responsible AI Commitment

We Build What We Believe In.

AuditPulse uses AI to generate compliance reports. We hold ourselves to the same transparency and oversight standards we audit others against. Our AI-generated reports are clearly labelled as such, include methodology documentation, and are never presented as legal advice. Human review is available on every Verified Audit.

Request Our Methodology Documentation

Enterprise customers can request our full methodology documentation, framework mapping evidence, and infrastructure security overview.

Request Documentation →

Report a Security Concern

If you discover a security vulnerability or have concerns about our data practices, please contact our security team directly.

Contact Security Team