Tangible Materials Trust Center
At Tangible Materials, security isn't just a feature—it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organizational policies. We treat the data entrusted to us—whether from our customers, their end users, or anyone who interacts with our organization—with the utmost care and responsibility. Security is embedded in our DNA, enabling us to deliver innovative solutions without compromising on protection.
Compliance
Resources
Controls
Subprocessors
FAQs
No, we do not train any AI model, but rely on pre-train models listed in our sub-processors.
All systems are patched and updated on a documented, regular, and timely schedule using the Common Vulnerability Scoring System (CVSS) to aid in setting patching guidelines. Critical security vulnerabilities must be patched as soon as possible regardless of CVSS score.
The organization adheres to the principle of least privilege, giving team members access only to information necessary for their job functions. Requests for privilege escalation require documented approval by an authorized manager, and regular audits of access privileges to sensitive applications are performed.