When you upload a document to Bounder, you trust us with your content. We take that seriously. Our security controls are designed and operated in alignment with industry standards so your data stays protected at every layer.
Our security program is built around the AICPA SOC 2 Trust Service Criteria framework. The controls described on this page map directly to SOC 2 categories — Security, Availability, Confidentiality, Processing Integrity, and Privacy. We are actively working toward formal SOC 2 Type II certification.
Each control category maps to specific SOC 2 Trust Service Criteria. These are the practices we follow today — not aspirational goals.
CC6 — Logical & Physical Access
CC6 — System Operations
CC6 — Encryption & Confidentiality
A1 — System Availability
C1 — Confidentiality
PI1 — Accurate Processing
CC7 — System Monitoring
P1–P8 — Privacy Criteria
We monitor our infrastructure continuously. Hover over any day to see details.
Last 90 days
We are transparent about every third-party service that processes your data. Each sub-processor is evaluated for security posture and compliance certifications.
| Provider | Purpose | Data Processed | Compliance |
|---|---|---|---|
| Supabase | Database, authentication, file storage | Account data, content, analytics | SOC 2 Type II |
| Stripe | Payment processing | Billing and card data | PCI DSS Level 1 |
| Railway | Application hosting and deployment | Request/response data | SOC 2 Type II |
| Resend | Transactional email delivery | Email addresses, names | SOC 2 |
| Upstash | Rate limiting (Redis) | IP addresses (ephemeral) | SOC 2 |
| MaxMind GeoLite2 | IP-to-country geolocation | IP → 2-letter country code (in-memory, no external calls) | — |
Google Analytics 4 (GA4) may also be configured per flipbook by the flipbook owner as an optional integration. When enabled, Google's privacy terms apply to that data.
The controls described on this page are in production today. We are formalizing our security program toward SOC 2 Type II certification. This includes continuous monitoring, formal policies, and an independent auditor engagement.
If you need a security questionnaire completed or have specific compliance requirements, we are happy to work with your team.
Contact our teamIf you discover a security vulnerability, we want to hear about it. Please report security issues responsibly by emailing us directly. We commit to acknowledging your report within 48 hours and working toward a resolution promptly.
Please do not publicly disclose vulnerabilities until we have had a chance to address them.
Report a vulnerabilityLast updated: March 9, 2026 · Privacy Policy · Terms of Service