Skip to main content
All CollectionsSecurity & data
How we keep your data secure at Browse AI
How we keep your data secure at Browse AI

Browse AI implements SOC 2 compliant security measures including encryption, access controls, and continuous monitoring to protect your data.

Nick Simard avatar
Written by Nick Simard
Updated this week

Our security approach

At Browse AI, security is built into everything we do. Our infrastructure is designed with multiple layers of protection to ensure your data remains secure whether it's being transmitted, stored, or processed. We maintain SOC 2 Type 1 compliance and are actively working towards SOC 2 Type 2 certification.

For more information, please visit Browse AI Trust Center.

Data protection measures

Authentication and access

  • We use Auth0 to authenticate users and manage Browse AI account credentials.

  • Strict access controls limit who can view your robots and extracted data.

  • Our support team can only access your robots upon explicit request, with all actions monitored and logged.

  • Support staff cannot access encrypted inputs such as recorded passwords.

Infrastructure security

  • All services and databases are hosted in AWS US data centers.

  • We implement network segmentation to prevent unauthorized access.

  • Firewall protection and intrusion detection systems continuously monitor for threats.

  • Infrastructure performance monitoring generates alerts when specific thresholds are met.

Data encryption

  • TLS 1.2 encryption used for all data transmissions.

  • Sensitive customer data is encrypted at rest using industry-standard encryption.

  • Passwords entered during recordings are encrypted with AES-256 and only decrypted when needed on our secure servers.

  • You and your team members can never access decrypted sensitive inputs.

Monitoring and incident response

  • Continuous system monitoring for anomalies or unauthorized access attempts.

  • Dedicated security operations team with advanced monitoring tools.

  • Regular review of audit logs to ensure compliance with security policies.

  • Formal incident response plan with regular testing.

Protecting your sensitive information

When you record robots that require login credentials or other sensitive information:

  1. Any passwords or sensitive data are encrypted immediately using AES-256.

  2. Encrypted data is stored securely and only decrypted on our servers when running a task.

  3. Neither you nor anyone on your team can access the decrypted values via the dashboard or API.

  4. We ensure no sensitive information is ever included in our logs.

Privacy and compliance

We maintain a detailed Privacy Policy that outlines what information we collect and how it's processed and stored. For comprehensive information about our security practices, please visit our Trust Center.​

Did this answer your question?