CivVora
Start free
Trust & security

The receipts, plainly stated.

You're trusting us with rosters, donations, and the records of how your community runs. This page is what we have today, what we're working on, and what we won't promise yet — written for a board member doing diligence and an IT lead reading carefully.

How we think about it

Four pillars. The classic CIA-A.

01

Confidentiality

Member rosters, payment history, and donor records are visible only to operators you explicitly authorize. Row-level security keeps tenants isolated even when our own engineers are debugging.

02

Integrity

Append-only audit log on configuration. Daily backups with point-in-time recovery. Database migrations gated by automated and human review.

03

Availability

99.9% uptime SLA on the Organization plan. Hosted on AWS us-east-2 with multi-AZ Postgres and automated failover. Live status page linked below.

04

Accountability

Every administrative action — by you or us — is recorded. We do not access your data without a documented support request, and the access is itself logged.

Data practices

What we will and won't do with your data.

01

We do not sell or share your member data.

Not to advertisers. Not to data brokers. Not to "partners." Your roster belongs to your organization, and stops at your organization.

02

We do not train AI on your data.

The compliance assistant uses retrieval against published government sources, not against your tenant. Your members' names, emails, and donation amounts are not in any training set — ours or anyone else's.

03

You can export everything, in formats anyone can read.

CSV for tabular data. JSON for nested structures. Postgres dump on request. The migration tools we built for inbound work in reverse, too.

04

You can delete everything, and we mean it.

Hard-delete on request honored within 30 days. Backups expire on rolling 35-day windows; the deletion propagates as those backups age out. We document the timeline in writing.

05

We publish our subprocessors.

Below. We email Organization-plan customers 30 days before adding a new one.

06

We will tell you about a breach within 72 hours.

Counted from the moment we confirm one — not the moment we finish investigating. We commit to this in the DPA and we have rehearsed the runbook.

AI in CivVora

The compliance assistant works for you — not the other way around.

We built CivVora's compliance feature because the rules around running a 501(c)(3), a chamber, or an HOA are scattered across fifty states and a thousand counties. AI is good at reading that. It is not infallible. Here's how we keep it accountable.

A human stays in the loop.

Compliance suggestions are surfaced as suggestions. Filing dates, jurisdictional rules, and required forms are reviewable by a person before anything submits or sends.

We cite our sources.

Every compliance answer links back to the underlying state, county, or federal page it was derived from. If we can't cite it, we don't say it.

We tell you when we don't know.

Coverage is uneven across jurisdictions. The assistant will say "we don't cover this yet" before it will guess — and we route those gaps to a real human on our team.

Your data is not in the model.

Your members, transactions, and content are not used for training. The Anthropic API we use is configured for zero data retention.

Subprocessors

The vendors we use to operate.

Updated monthly. Organization-plan customers are notified by email 30 days before any addition.

Vendor
Purpose
Region
AWS
Hosting, database, object storage, KMS
US-East-2 (Ohio)
Stripe
Payment processing, payouts
United States
Postmark
Transactional email (receipts, password resets)
United States
Resend
Member-facing newsletters and announcements
United States
Cloudflare
CDN, DDoS protection, image optimization
Global edge
Anthropic
AI — compliance assistant retrieval & summarization
United States. Zero-retention API.
PagerDuty
On-call routing for production incidents
United States
Linear
Internal issue tracking. Customer data is never copied here.
United States

Last updated April 18, 2026. Full DPA, including the standard contractual clauses, is available on request.

If something goes wrong

Incident response.

We rehearse this. Tabletop exercises every quarter, full restore drills against the backup database, and a written runbook for the kinds of incidents that have actually happened to platforms our size.

0:00
Detect
Pager fires from automated monitoring or a customer report. On-call engineer ack within 5 minutes.
0:15
Triage
Severity assigned. Status page updated to investigating. Internal incident channel opened.
1:00
Communicate
Customer-facing update on the status page. Direct email to affected operators if data is involved.
24h
Stabilize
Service restored, root cause identified, monitoring added to catch the next one earlier.
72h
Notify
Written breach notification to affected customers if member data was involved. Counted from confirmation, not from end of investigation.
2 weeks
Postmortem
Blameless writeup published to all affected customers. What happened, why it happened, what we changed.
A letter from the founder

If you've gotten this far down the page, you're either on a board doing diligence, or in IT at an organization bigger than the ones we usually serve. Either way — thank you for reading carefully. It's the right thing to do.

Here is the truth: CivVora is a small company. We are not large enough to have a CISO with a corner office. What we have instead is a team that has personally migrated a hundred-some organizations off Mailchimp and QuickBooks and a paper roster, and the engineer who wrote the row-level security rules also takes the on-call pager.

We chose to write this page in the same voice we'd use to walk you through it on a call, because the alternative — a glossy "enterprise-grade trust" page that hides the gaps — is what every other vendor does, and I don't think any of you are fooled by it.

If something on this page is missing or unclear, that's a real signal to me. Email me directly: nora@civvora.com. I read every one and I will tell you the truth, including when the answer is "not yet."

— Nora Aldrich, founder. Mayberry, California. Updated April 28, 2026.

Where we stand

What's done, what's in motion, what's not.

We're a four-year-old company supporting 340+ organizations. We've got the fundamentals tight; we're working through the certifications. Here's the truth on each.

In place today

Encryption in transit

TLS 1.2+ on every connection. HSTS enforced on all marketing and app domains.

Encryption at rest

AES-256 on the database and all object storage. Keys managed via AWS KMS.

Daily encrypted backups

35-day retention, point-in-time recovery to any minute in the last 7 days. Restore drills run quarterly.

PCI handled by Stripe

Card numbers never touch our servers. Stripe is PCI-DSS Level 1 — we inherit the scope.

Tenant isolation

Single multi-tenant Postgres with row-level security on every table. Every query is org-scoped at the framework layer, with a database-level safety net.

2FA for operators

TOTP available on every operator account. Required for the Owner role.

Audit log inside the product

Every config change, role change, and bulk action is logged with actor, timestamp, and before/after — visible to operators in-app.

Real export, anytime

CSV for everything, Postgres dump on request. We help you migrate off the same way we help you migrate on.

In progress

SOC 2 Type II

Audit window opened February 2026. Type I report available now under NDA. Type II expected Q4 2026.

Third-party penetration test

Annual engagement with a CREST-certified firm; first report dated November 2025. Summary letter available under NDA.

SAML SSO

Available on the Organization plan and above today (Google Workspace, Microsoft 365, Okta). SCIM provisioning is the next item up.

WCAG 2.1 AA

Self-audited across the operator console; third-party audit scheduled for Q3. Outstanding issues tracked publicly on our changelog.

On the roadmap (or not in scope)

SCIM provisioning

Next on the SSO track. Q3 2026.

Public status page

Live today at status.civvora.com — see the badge below. Historical incidents back to Jan 2025.

Customer-managed encryption keys

Asked for by two of our largest customers. Designing now; not yet committed to a date.

HIPAA / BAA

Not in scope today. We will tell you up front if your use case requires it.

Talk to us

Specific question? Ask a person.

Security questions, DPA requests, pen-test summary, sub-processor schedule — all of it goes to one inbox, monitored by an engineer.

Security inbox
security@civvora.com
For questions about this page
DPA request
legal@civvora.com
GDPR / CCPA / SCCs
Report a vulnerability
security@civvora.com
PGP key on the security.txt file