SOC 2 Type II
In ProgressThird-party audit of security, availability, and confidentiality controls.
Target: Q4 2026
Trust Center
Security, compliance, and privacy at FirmFirst — verified and up to date.
Last reviewed: February 2026
Third-party audit of security, availability, and confidentiality controls.
Target: Q4 2026
Data Processing Agreements available. Right to access, rectification, erasure, and portability.
DPA available on request
California Consumer Privacy Act compliance for California-based prospects.
Effective since launch
Signal analysis and verification workflows help attorneys meet 'reasonable inquiry' obligations.
Aligned since launch
AES-256 encryption for all stored data
TLS 1.3 for all data transmission
Tokens, keys, and credentials encrypted separately
Point-in-time recovery capability
Permissions scoped to job function
Required for all personnel
Minimum necessary permissions by default
All access events recorded and retained
US data centers (us-central1)
Isolated production environments
Cloud-native DDoS mitigation
Continuous dependency and infrastructure scanning
Documented procedures for security events
Per GDPR requirements
Sub-processor compliance verification
Mandatory onboarding and annual refresher
Third-party vendors that process data on behalf of FirmFirst.
| Vendor | Purpose | Data Processed | DPA |
|---|---|---|---|
| Google Cloud | Infrastructure & hosting | All platform data | Signed |
| Twilio | SMS notifications | Phone numbers | Signed |
| Postmark | Email delivery | Email addresses | Signed |
| IPQS | Email & phone validation | Email, phone, IP address | Signed |
| Fingerprint.com | Device & network analysis | Device signals, IP address | Signed |
| People Data Labs | Person enrichment (premium) | Name, email | Signed |
How we collect, use, and protect your data
Terms governing use of the FirmFirst platform
Standard DPA for GDPR compliance
Detailed overview of security architecture and practices (Q3 2026)
Independent audit report of security controls (Q4 2026)
Need to report a vulnerability or request security documentation?