Trust Center

Trust

Independent attestations, sub-processor disclosures, and live system status — everything enterprises need to evaluate Nexma in one place.

Certifications

Nexma's compliance program is in active build-out. We list every framework we're working toward, with honest status and target dates — no claims of certifications we don't yet hold.

SOC 2 Type II

In progress

Independent audit of security, availability, and confidentiality controls. Engagement underway with a Big-Four-affiliated auditor.

Target: Q4 2026

ISO/IEC 27001

Planned

International standard for information security management systems. Gap assessment scheduled; full certification follows SOC 2.

Target: Q2 2027

GDPR

Operational

Data processing addendum, sub-processor disclosure, and EU-data-subject rights workflow are live. Standard contractual clauses available on request.

Target: Operational

HIPAA

Planned

Available to customers handling protected health information under a Business Associate Agreement. Required controls partially in place.

Target: Q1 2027

CCPA / CPRA

Operational

California consumer privacy rights, opt-out, and deletion workflows are integrated into the privacy program.

Target: Operational

PCI DSS

Not applicable

Nexma does not store or process cardholder data. Payments are handled by upstream processors; PCI scope does not apply to our infrastructure.

Target: Out of scope

Sub-processors

These are the third-party services that may process customer data on Nexma's behalf. Each is bound by a data processing agreement and reviewed annually.

VendorPurposeData categoriesLocation
VercelApplication hosting and edge deliveryAll customer-facing data in transitUS
SupabasePrimary database and object storageApplication data, project contentUS
ClerkAuthentication and identityUser identity, session metadataUS
AnthropicLarge language model inferencePrompts and Codex content sent to JaxUS
MapboxMap tiles and geocodingGeographic queries, viewport coordinatesUS
ResendTransactional email deliveryUser email address, message contentUS
UpstashRate limiting and edge cacheRequest metadata, IP hashesUS
PostHogProduct analyticsAnonymized usage events, feature interactionsUS

We notify customers of material changes to this list at least 30 days before adding a new sub-processor that touches their data. Full disclosure in the legal vault.

Status

Real-time visibility into the platform's availability. Historical uptime and incident history live on the public status page.

Checking status

Fetching the latest signal from the platform.

Open status page

Data Handling

A short summary of how Nexma stores, encrypts, retains, and deletes customer data. The full policies are in Downloads.

All customer data is stored and processed in the United States. We do not replicate to other regions today. EU and UK residency are on the roadmap and will be announced when available; customers with regional requirements should reach out before contracting.

Data is encrypted in transit with TLS 1.2 or higher and at rest with AES-256. Database backups are encrypted with rotating keys. Secrets are stored in a managed key vault, never in source control or build artifacts.

Active project data is retained for the duration of the customer relationship. Audit logs are retained for twelve months. Backups roll on a thirty-day window. Deleted projects enter a thirty-day soft-delete window before being purged from primary storage and backups on the next rotation.

Customers may request export or deletion of their data at any time through their account owner; we honor verified requests within thirty days. See the full retention and deletion policy.

Incident Response

Our commitment to detecting, communicating about, and learning from security events.

Nexma operates a 24/7 on-call rotation. Security-relevant events are triaged within one hour of detection. Customers whose data is affected by a confirmed incident receive direct notification within seventy-two hours of confirmation, regardless of regulatory minimums.

Within fourteen days of resolution we publish a post-mortem to affected customers covering timeline, root cause, customer impact, and the concrete actions we are taking to prevent recurrence. Material incidents are also summarized on the public status page.

Report a security concern to security@nexma.ai. Live availability and incident history are published at status.nexma.ai.

Request Access

Need our SOC 2 readiness letter, a signed DPA, or a security questionnaire response? Send a short note and a sales engineer will follow up.

We respond to verified work-email requests within two business days.