Last update:Jan 8, 2026
Data Security
1. Overview
RETS AI INCORPORATED ("Rets AI") is committed to protecting the confidentiality, integrity, and availability of customer data. This Data Security Policy describes the technical and organizational measures we implement to safeguard data processed through our commercial real estate intelligence platform.
Rets AI is currently in progress of obtaining SOC 2 Type II certification. Our security program is designed to meet the Trust Services Criteria for Security, Availability, and Confidentiality.
2. Infrastructure Security
2.1 Cloud Infrastructure
Rets AI infrastructure is hosted on Amazon Web Services (AWS) in the US-East region. AWS maintains comprehensive security certifications including SOC 1, SOC 2, SOC 3, ISO 27001, ISO 27017, ISO 27018, and FedRAMP.
Our infrastructure security includes:
Virtual Private Cloud (VPC) network isolation
Security groups and network access control lists
Web Application Firewall (WAF) protection
DDoS mitigation through AWS Shield
Continuous infrastructure monitoring and logging
2.2 Data Residency
Customer data is stored and processed within AWS data centers located in the United States (US-East region). Data does not leave the United States unless explicitly required for service delivery to international customers, in which case appropriate safeguards are implemented.
3. Data Encryption
3.1 Encryption in Transit
All data transmitted between customers and Rets AI services is encrypted using Transport Layer Security (TLS) 1.2 or higher. We enforce HTTPS for all web traffic and do not support unencrypted connections.
3.2 Encryption at Rest
All customer data stored in our systems is encrypted at rest using AES-256 encryption. This includes:
Database storage
File storage (uploaded documents)
Backups and snapshots
Log files containing sensitive information
3.3 Key Management
Encryption keys are managed through AWS Key Management Service (KMS), which provides centralized control over cryptographic keys with hardware security module (HSM) protection. Keys are rotated according to industry best practices.
4. Access Control
4.1 Authentication
Rets AI enforces strong authentication controls:
Secure password requirements (minimum length, complexity)
Multi-factor authentication (MFA) available for all accounts
Session management with automatic timeout
Account lockout after failed authentication attempts
Single Sign-On (SSO) integration available for enterprise customers
4.2 Authorization
Access to customer data is governed by role-based access control (RBAC). Users are granted the minimum permissions necessary to perform their functions. Customer data is logically segregated, ensuring that users can only access data belonging to their organization.
4.3 Internal Access
Rets AI employees access production systems only when necessary for service delivery, troubleshooting, or security purposes. All internal access requires:
Multi-factor authentication
VPN or secure access gateway
Documented business justification
Audit logging of all access events
5. Application Security
5.1 Secure Development
Rets AI follows secure software development practices:
Security requirements integrated into development lifecycle
Code review for all changes before deployment
Static application security testing (SAST)
Dependency scanning for known vulnerabilities
Separate development, staging, and production environments
5.2 Vulnerability Management
Rets AI maintains a vulnerability management program that includes:
Regular automated vulnerability scanning
Annual third-party penetration testing
Timely patching of identified vulnerabilities based on severity
Monitoring of security advisories for dependencies and infrastructure components
6. Data Isolation and Segregation
Customer data is logically segregated within our multi-tenant architecture. Each customer's data is isolated through:
Unique customer identifiers enforced at the application layer
Database-level access controls preventing cross-tenant queries
Isolated storage containers for document uploads
Testing and validation of tenant isolation controls
7. Monitoring and Logging
Rets AI maintains comprehensive monitoring and logging capabilities:
Centralized logging of security events, access attempts, and system activities
Real-time alerting for anomalous activities and potential security incidents
Infrastructure and application performance monitoring
Log retention for a minimum of 12 months
Protection of log integrity against tampering
8. Incident Response
Rets AI maintains a documented incident response plan that defines procedures for identifying, responding to, and recovering from security incidents.
8.1 Incident Response Process
Detection: Automated monitoring and alerting systems identify potential security events
Triage: Security team evaluates and classifies incidents based on severity and impact
Containment: Immediate actions to limit the scope and impact of the incident
Eradication: Removal of the threat and remediation of affected systems
Recovery: Restoration of normal operations with enhanced monitoring
Post-Incident Review: Analysis and documentation of lessons learned
8.2 Customer Notification
In the event of a confirmed security incident affecting customer data, Rets AI will notify affected customers without undue delay and in accordance with applicable legal requirements. Notification will include the nature of the incident, data affected, remediation steps taken, and recommended actions for customers.
9. Business Continuity and Disaster Recovery
9.1 Data Backup
Rets AI implements comprehensive backup procedures:
Daily automated backups of all customer data and system configurations
Encrypted backup storage in geographically separate AWS availability zones
Regular testing of backup restoration procedures
Backup retention aligned with data retention policies
9.2 Disaster Recovery
Our disaster recovery program is designed to restore services in the event of a significant disruption:
Documented recovery procedures for critical systems
Multi-availability zone deployment for high availability
Defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO)
Regular testing and validation of disaster recovery procedures
10. Personnel Security
Rets AI maintains personnel security controls to ensure that individuals with access to customer data are trustworthy and properly trained:
Background checks for employees with access to production systems
Confidentiality agreements for all employees and contractors
Security awareness training upon hire and periodically thereafter
Prompt revocation of access upon termination or role change
11. Third-Party Security
Rets AI evaluates the security posture of third-party service providers that process or have access to customer data. Our third-party risk management includes:
Security assessment prior to engagement
Contractual security and confidentiality requirements
Preference for providers with industry-recognized certifications (SOC 2, ISO 27001)
Ongoing monitoring of provider security posture
Key infrastructure and service providers:
Provider | Certifications |
Amazon Web Services (AWS) | SOC 1, SOC 2, SOC 3, ISO 27001, ISO 27017, ISO 27018, FedRAMP, PCI DSS |
LLM Provider | SOC 2 Type II |
Stripe (Payment Processing) | PCI DSS Level 1, SOC 1, SOC 2 |
12. Compliance
12.1 SOC 2
Rets AI is currently in progress of obtaining SOC 2 Type II certification. Our security controls are designed and implemented in accordance with the AICPA Trust Services Criteria for Security, Availability, and Confidentiality. Upon completion, audit reports will be available to customers under NDA.
12.2 Privacy Regulations
Rets AI maintains compliance with applicable privacy regulations, including the California Consumer Privacy Act (CCPA), California Privacy Rights Act (CPRA), and General Data Protection Regulation (GDPR). Please refer to our Privacy Policy for detailed information on our data privacy practices.
13. Security Inquiries
For security-related inquiries, to report a vulnerability, or to request additional security documentation, please contact:
RETS AI INCORPORATED
2001 Ross Ave
Dallas, TX 75201
Email: privacy@rets.ai
14. Policy Updates
Rets AI reviews and updates this Data Security Policy at least annually or as needed to reflect changes in our security practices, technology, or regulatory requirements. Material changes will be communicated to customers through our standard notification channels.