At Carta, trust, transparency, and integrity are our most important currency. We have strict procedures, systems, and technologies to protect your cap table data. Customer data is encrypted at rest (AES256) and in transit (TLS 1.2+). Carta follows the principle of least privilege for system and data access, which means access to systems that store customer data is restricted to authorized individuals. You can read more in-depth about our compliance and security controls in our SOC 1/2 reports and related security documentation, which is available on our customer trust platform, Conveyor.
Who has access to see my cap table?
Access to systems that store customer data is restricted to authorized individuals based on their assigned role. Access outside a user’s standard job function requires documented approval from the system owner.
Do you track who’s accessed my cap table?
Yes. Every internal action and click on the Carta platform is logged.
How is data recovered in case of loss?
We back up data daily and restore daily to ensure we can recover from potential disruptive events. We have implemented a highly available and redundant architecture through AWS hosted services so if one data center goes out, our services can maintain operations. In addition, we have a Business Continuity Plan that is reviewed, updated, tested and approved annually.
How is customer data protected?
Carta has a robust defense-in-depth strategy to safeguard our customers’ data. These measures include controls implemented across various domains, including:
Multiple independent third-party auditors review our policies and controls on a periodic basis as part of our SOC1, SOC2, and ISO 27001 audits, which can be accessed here.
How is data used in Carta data reports?
We create, use, and share aggregated and anonymized data in our data reports.