Trust starts with transparency
The Tuteliq Trust Center at trust.tuteliq.ai is where you can verify our security posture, compliance status, and data handling practices — all in one place.Visit Trust Center
View real-time security and compliance information at trust.tuteliq.ai
What you’ll find
Security Practices
Infrastructure security, encryption standards, access controls, and vulnerability management policies.
Compliance Status
Current compliance posture for GDPR, KOSA, EU Digital Services Act, UK Online Safety Act, and more.
Sub-Processors
Full list of third-party sub-processors, their locations, purposes, and DPA links.
Data Handling
Retention policies, data minimization practices, and encryption-at-rest and in-transit details.
Key commitments
| Area | Commitment |
|---|---|
| Encryption | TLS 1.3 in transit, AES-256 at rest |
| Data residency | US and EU regions available |
| Retention | Analysis results: 90 days · Audio files: 24 hours · API logs: 30 days |
| Erasure | Full data deletion within 1 hour of request |
| Access control | Role-based access, audit logging, API key scoping |
| Incident response | 24-hour notification for security incidents |
Compliance documentation
The following endpoints are publicly accessible and require no authentication:| Endpoint | Description |
|---|---|
GET /compliance/dpa | Current Data Processing Agreement (PDF) |
GET /compliance/sub-processors | List of sub-processors with locations and roles |
GET /compliance/retention | Data retention policy by data type |