Dokai Trust Center
At Dokai, security isn't just a feature, it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us, whether from our customers, their end users, or anyone who interacts with our organization - with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.
Compliance
Links
Resources
SOC 2 Type II Report
Baseline Hardening Policy
Vendor Management Policy
Company Handbook
Business Continuity and Disaster Recovery
Controls
Access review of infrastructure
VPN access
Multifactor authentication
Access control procedures
Tracking access changes
Encryption of data
Data protection policy
Privacy and confidentiality governance charter
Data transfer policy
Data transfer agreement
Source code tool
Business continuity and disaster recovery testing
Web application firewall
Sample code changes
Outsourced Development Management
Intrusion detection tool
Infrastructure baseline hardening policy
Network diagram
Monitoring tool
Infrastructure firewall
Incident response and breach notification policy
Breach notification communication
Security incident list
Alerts and remediation
Internal GDPR compliance assessments
Binding corporate rules policy
Whistleblower policy
Rectification request policy
Objection handling policy
Log management tool
Vendor management program
ePHI risk assessment report
Vendor onboarding
Vendor list
Vendor termination
Consent records
Age verification and parental/guardian consent process
HRS-5
HRS-7
Existing employee and contractor agreements
Customer onboarding
New employee and contractor agreements
Multi-availability zones
Asset register maintaining
Risk management program
Risk and Governance Executive Committee meeting minutes
Lawful basis assessment
Legitimate interest assessment
ePHI media disposal documentation
DCH-3
IRO-2
Patch management
Antivirus and malware configurations
Subprocessors
GitHubCode & Build Security
HerokuCloud Infrastructure & Platform Services
OpenAIAI & ML Services
Stytch - A better way to build authIdentity & Access Management