Security

Last updated on July 12, 2025

Imprint uses industry-leading technologies and AI-enhanced security protocols to protect your data against unauthorized access, disclosure, use, and loss.

All Imprint administrators receive continuous security training during company onboarding and on a quarterly basis.

Security at Imprint is directed and maintained by our founders and overseen by our dedicated security team.

1. Infrastructure and Network Security

Our platform is hosted on Railway's infrastructure in Amsterdam, Netherlands, with additional distributed presence across Railway's global network. Railway operates enterprise-grade data center facilities that maintain rigorous physical security measures and compliance certifications.

Railway Data Center Infrastructure: Railway's Amsterdam facility includes:

  • Multi-tier physical security with controlled access points

  • 24/7 security monitoring and surveillance systems

  • Biometric access control and security personnel

  • Environmental monitoring and disaster protection systems

  • Redundant power and cooling infrastructure

  • Network-diverse connectivity with multiple Tier 1 ISPs

Security Certifications: Railway's infrastructure partners maintain:

  • Comprehensive security and compliance programs

  • Industry-standard certifications including ISO 27001

  • Regular third-party security audits and assessments

  • Compliance with European data protection regulations including GDPR

  • Physical security measures meeting enterprise standards

Imprint employees do not have physical access to any data centers, servers, networking equipment, or storage media.

2. Logical Access Control

We maintain strict controls over infrastructure access:

  • Limited administrator access to authorized employees only

  • Multi-factor authentication requirement for all administrative access

  • Detailed audit logging and monitoring

  • Private network administration with zero-trust architecture

  • Regular certificate rotation and key management

  • AI-powered anomaly detection for suspicious access patterns

3. Authentication Security

Our authentication system provides enterprise-grade security through multiple mechanisms:

  • OAuth2 integration with Google

  • Session-based authentication with automatic token rotation

  • Comprehensive token refresh and expiry management

  • Scope-based authorization controls with role-based access

  • Active session validation and real-time monitoring

  • Single Sign-On (SSO) support for enterprise customers

With Single Sign-On (SSO), we allow users to access multiple applications with a single set of credentials, simplifying user management and reducing password-related vulnerabilities.

4. AI Security & Privacy

As an AI-native platform, Imprint implements additional security measures for AI processing:

  • Data isolation ensures your documents are processed in isolated environments

  • AI model encryption protects proprietary algorithms and processing logic

  • Zero data retention policy for AI training - your documents are never used to train our models

  • Edge processing capabilities to minimize data transmission

  • Encrypted AI pipelines with end-to-end protection during document analysis

5. Location & IP Security

We maintain robust location-based security through continuous monitoring and verification:

  • Location tracking and verification for all access attempts

  • Known IP address monitoring and validation

  • Automatic notifications for new location access

  • Account locking after multiple suspicious attempts

  • Comprehensive location-based risk assessment

  • Real-time email alerts for security events

  • AI-powered behavioral analysis to detect unusual access patterns

6. Data Flow Security

Data Arriving from Customers

We maintain strict security standards for incoming data:

  • HTTPS encryption using TLS 1.3 or above

  • Rejection of connections using TLS below 1.2

  • Zero-trust network with full traffic encryption

  • Regular SSL configuration testing via SSL Labs

  • AI-enhanced rule and anomaly-based request monitoring

  • Document content scanning for malware and threats

Data Leaving the System

Customers can access their data through multiple secure channels:

  • Web Application (app.imprint.so)

  • REST API (api.imprint.so)

  • Webhook integrations with enterprise-grade security

All data access methods ensure TLS 1.3+ encryption in transit and comprehensive audit logging.

7. Application Security

Authentication Methods

We support multiple secure authentication options:

Sign In with Google:

  • Google/GSuite account integration

  • Annual Google Security Assessment

  • Third-party security audit validation

REST API Authentication

  • Brute force resistant API keys with intelligent rate limiting

  • Self-service token management with granular permissions

  • Secure key storage and transmission

  • Session-based request validation with automatic rotation

  • Origin validation and environment-specific controls

  • AI-powered API threat detection

Verification for Destructive Operations

To prevent accidental or unauthorized destructive actions, we implement:

  • Multi-factor verification codes for major operations such as deleting a project or user

  • Comprehensive user permission management to control access to sensitive functionalities

  • Time-delayed execution for critical operations with cancellation windows

  • AI analysis of destructive actions to flag potentially malicious behavior

8. Document Security & Compliance

Cryptographic Security

  • Document sealing using advanced cryptographic signatures to prevent tampering

  • Multi-level signature support (Simple Electronic Signature, UETA, etc.)

  • Timestamp authority integration for legal compliance

  • Certificate-based signing with Hardware Security Module (HSM) support

  • End-to-end encryption for all document processing workflows

Compliance Standards

Imprint adheres to major electronic signature regulations and standards:

  • ESIGN Act compliance for legal validity in the United States

  • eIDAS regulation compliance for European Union operations

  • 21 CFR Part 11 compliance for FDA-regulated industries

  • GDPR compliance for data protection and privacy

AI Document Processing Security

  • Content-aware encryption that protects sensitive information during AI analysis

  • Federated learning models that never expose raw document content

  • Differential privacy techniques to protect individual document characteristics

  • Secure multi-party computation for collaborative document processing

9. Business Continuity

High Availability

Our platform operates on Railway's infrastructure in Amsterdam, Netherlands with:

  • Redundant servers within Railway's Amsterdam data center facility

  • Auto-scaling infrastructure with AI-optimized resource allocation and Railway's dynamic scaling

  • Private networking between services for secure, high-performance inter-service communication

  • Infrastructure redundancy with Railway's enterprise-grade hosting capabilities

  • Zero-downtime deployments with Railway's instant deployment capabilities

  • Intelligent load balancing with automatic traffic distribution

Backup Systems

We maintain comprehensive backup procedures within Railway's Amsterdam infrastructure:

  • Continuous data replication with Railway's automated backup systems

  • Encrypted storage with military-grade encryption standards on Railway's secure infrastructure

  • Real-time integrity verification with blockchain-based checksums and Railway's native monitoring

  • Automated restoration testing with AI-powered validation within Railway's platform

  • Point-in-time recovery capabilities with granular restoration options

  • Data sovereignty compliance ensuring all backups remain within Netherlands jurisdiction

Disaster Recovery

We maintain ready-to-deploy recovery procedures within Railway's Amsterdam infrastructure:

  • Infrastructure redundancy within Railway's Amsterdam hosting facility

  • Documented recovery processes with step-by-step procedures optimized for Railway's platform

  • Regular testing and validation of disaster recovery protocols on Railway's infrastructure

  • Incident response protocols with AI-assisted threat analysis and Railway's real-time monitoring

  • Business continuity planning with stakeholder communication procedures and Railway's status systems

  • Data sovereignty compliance ensuring all recovery processes remain within Netherlands jurisdiction

  • Automated failover mechanisms leveraging Railway's platform capabilities for service continuity

10. Monitoring & Threat Detection

We provide comprehensive security monitoring powered by AI:

  • Real-time event logging with anomaly detection

  • AI-powered suspicious activity alerts and automated response

  • Behavioral analysis for user and system activity tracking

  • Security audit trails with immutable logging

  • Proactive threat hunting with machine learning models

  • User notifications for security events and policy changes

  • 24/7 security operations center monitoring

AI-Enhanced Security Features

  • Predictive threat modeling to anticipate security risks

  • Automated incident response for common security events

  • Pattern recognition for detecting sophisticated attacks

  • Adaptive security controls that evolve with threat landscape

  • Machine learning-based fraud detection for document authenticity

11. Privacy & Data Protection

Data Sovereignty

  • Data residency controls to meet regulatory requirements

  • Open-source transparency with publicly auditable code

  • Customer data ownership with clear data processing agreements

Privacy by Design

  • Minimal data collection principles with purpose limitation

  • Automated data retention policies with secure deletion

  • User consent management with granular privacy controls

  • Privacy impact assessments for new features and processes

12. Contact & Reporting

For security concerns, vulnerability reports, or questions about our security practices:

Email: support@tryimprint.app
Bug Bounty Program: Available for responsible disclosure
Security Documentation: Available upon request for enterprise customers

We maintain a responsible disclosure policy and work with security researchers to identify and address potential vulnerabilities. Our security team responds to all reports within 24 hours and provides regular updates throughout the resolution process.

Fast, Reliable, Affordable Signing

Send, track, and complete documents with ease — all at a fraction of the cost of traditional e-signature platforms.

Fast, Reliable, Affordable Signing

Send, track, and complete documents with ease — all at a fraction of the cost of traditional e-signature platforms.

Fast, Reliable, Affordable Signing

Send, track, and complete documents with ease — all at a fraction of the cost of traditional e-signature platforms.