System Reliability and Secure Infrastructure
From how we build and deploy or product to the infrastructure that supports it, we have practices in place to monitor the system and ensure consistent availability.
Procedures and Controls to Ensure Privacy and Security
By following rigorous security and data privacy procedures and controls, project44 has the necessary process in place to proactively secure and handle data.
Secure Employee Management and Training
To ensure our employees are equipped to keep data safe, we conduct background checks, train team members about our security policies, and ensure our offices are secure.

Data Privacy
project44 is compliant will all data privacy regulations and policies where we operate. We follow the policies outline by the General Data Protection Regulation (GDRP) and the EU-U.S. Privacy Shield Framework.
Control Procedures & Audits
project44 goes through various audits to ensure we comply with respected cloud security practices. Our control procedures have been verified in a SOC 2 Type II report and we undergo an annual audit by an independent third party to verify our security procedures and safeguards.