Security & Confidentiality Statement

Last updated: February 7, 2026

1. Our Commitment

At AuditCode, we understand that your source code and technical infrastructure represent your most valuable intellectual property. We are committed to maintaining the highest standards of security and confidentiality in handling your sensitive information.

2. Confidentiality Principles

All client information is treated as strictly confidential:

3. Non-Disclosure Agreement (NDA)

3.1 Standard NDA

All engagements include a mutual NDA as standard. This legally binding agreement ensures:

3.2 Custom NDAs

We are happy to sign your organization's NDA template if preferred. We review and typically accept reasonable confidentiality terms.

4. Technical Security Measures

4.1 Secure Code Access

4.2 Data Storage

4.3 Communication Security

5. Team Access Controls

5.1 Need-to-Know Basis

Only team members directly involved in your audit have access to your code and information.

5.2 Background Checks

All team members undergo thorough background verification and sign individual confidentiality agreements.

5.3 Access Logging

All access to client code and systems is logged and auditable. Access is immediately revoked upon project completion.

6. Data Retention and Destruction

6.1 Source Code

Default policy: All source code and technical materials are securely deleted within 90 days of project completion.

Alternative arrangements can be made if you prefer immediate deletion or extended retention.

6.2 Audit Reports

Retention: Final audit reports are retained for 7 years for professional compliance and potential follow-up audits.

Reports are stored encrypted and access-controlled.

6.3 Secure Deletion

Data destruction follows industry standards:

7. Vulnerability Disclosure

7.1 Responsible Disclosure

Security vulnerabilities discovered during audits are:

7.2 Critical Vulnerabilities

For critical security issues, we provide immediate notification via secure channels and work with you on remediation timelines.

8. Compliance and Certifications

Our security practices align with:

9. Incident Response

In the unlikely event of a security incident:

10. Professional Insurance

We maintain professional indemnity and cyber liability insurance to protect both our clients and our business.

11. Questions and Verification

We welcome questions about our security practices and are happy to:

12. Contact

For security or confidentiality questions:

← Back to Home