Feather logo
Live monitoring by Delve
Feather Compliance Report
Feather is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IIIn Observation

SOC 2 Type II

Audited controls for security, availability, and confidentiality trust service principles with an observation period.

In the observation period
HIPAACompliant

HIPAA

US regulation that safeguards medical data privacy and security. Essential for healthcare providers, insurers, and related tech.

Continuously monitored
GDPRCompliant

GDPR

EU regulation that governs personal data protection and privacy for individuals within the EU. Applies globally to anyone handling EU data.

Continuously monitored
SOC 2 Type IPending

SOC 2 Type I

Audited controls for security, availability, and confidentiality trust service principles.

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

Sensitive Data Processing and Impact Assessment Policy

Policy document

PDF

Risk Assessment and Treatment Policy

Policy document

PDF

Breach Notification Policy

Policy document

PDF

Records of Processing Activities (ROPA) Policy

Policy document

PDF

Data Protection and Encryption Policy

Policy document

PDF

Data Subject Rights and Request Policy

Policy document

Security controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Alerts and Remediation
Completed
Board Charter
Completed
Showing 6 of 7 control categories

Subprocessors directory

We carefully select and monitor all third-party services that process data on our behalf.

Webhooks as a Service – Secure and Enterprise Ready · Svix logo

Webhooks as a Service – Secure and Enterprise Ready · Svix

Messaging Services

Pinecone logo

Pinecone

Database Services

OpenAI logo

OpenAI

AI & Machine Learning

Elevenlabs logo

Elevenlabs

AI & Machine Learning

Cekura | Automated QA for Voice AI and Chat AI Agents logo

Cekura | Automated QA for Voice AI and Chat AI Agents

Analytics & Insights

Tinybird · Managed ClickHouse® for AI-Native Developers logo

Tinybird · Managed ClickHouse® for AI-Native Developers

Analytics & Insights

Showing 6 of 10 subprocessors

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Feather, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies.

We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.