Enterprise Grade Security

Security is at the core of what we build and how we operate. Your business-critical contract data is secured using industry-leading practices

Start Trial

Certifications & Compliance

SOC 2 Type II Compliance

We are collaborating with Sprinto to review / ensure our data security practices and infrastructure complies with SOC 2 standards.


Our collaboration with Sprinto also covers review / audit of GDPR compliance.

Multi Layered Data Security Approach

Data Encryption

Our platform encrypts data at-rest as well as when it is in transit. At-rest encryption is multi-layered, using AES-256 in the database tables/columns, and also the encrypted on the file-system level as well. Data in transit (between systems and to the browsers) uses TLS 1.2 or higher as the encryption standard.

Infrastructure Security

ContractKen platform is hosted on Amazon Web Services infrastructure in US and EU regions in a security Virtual Private Cloud. AWS's ISO 27001 certified data centers with robust physical security, along with SOC 1, 2, and 3 compliance provide a secure and reliable foundation on which we have built additional security measures.

Operational Security

We operationalize security by utilizing industry leading monitoring tools to ensure the platform remains secure. Our application development process is protected by code security scans and manual code reviews. Our entire team goes through regular security training to ensure we stay ahead of cyber-threats as a team and continue to run a secure platform for our customers.

Moderation Layer

Industry leading approach to handle data confidentiality inside Microsoft Word. Our proprietary algorithms, automatically mask, anonymize or warn users about sensitive data, based on policies set by IT. Enterprise can control usage with confidence that data is secured and Audit Logged.

We value the trust you put in our products and solutions

We want everyone to feel confident about engaging with ContractKen's product and solutions — whether that’s through our Microsoft Word Add-in, Web Application, or other offerings. This means providing clear and easy-to-access information about the efforts we take to keep your information secure and to respect your data privacy.

ContractKen's user-first principles.

1. We make money by selling subscriptions to our products - not your data

2. We keep Data Privacy first - by design
  • Contracts that you work upon using our products can only be viewed by you or others in your organization
  • You can view all the data associated with your account, any time
3. We are extremely vigilant about Information Security
  • All data is encrypted using latest security algorithms
  • Multi Factor Authenticated Access to the products only - to prevent any unauthorized access
  • We regularly engage with third party security professionals to assess our policies and infrastructure
  • We use secure cloud architecture provided by AWS - instance in customer's home location (US or EU or UK)
  • We are on track to get certified for enterprise grade security certification SOC II Type 2