Security, Compliance & Trust

Faraday is committed to protecting customer data, maintaining strong security controls, and providing transparent information about our compliance, privacy, and support practices.

compliance

ISO/IEC 27001 Certified

privacy

Published Privacy Policy

support

Dedicated Help Desk

Transparency

Centralized Security Information

overview

Built to support enterprise security requirements

Our Trust Center is designed to give customers, prospects, and partners a clear view of how Faraday approaches information security, privacy, compliance, and operational support.

This page summarizes our core controls and governance practices, and provides the right contact points for security, privacy, and support-related requests.

What you will find here

  • Security and compliance commitments
  • Information about ISO/IEC 27001 certification
  • Privacy and data handling references
  • Support and communication channels
  • Guidance for security or compliance inquiries
compliance

Our compliance commitment

Security management based on internationally recognized controls

Faraday operates with an Information Security Management System aligned with ISO/IEC 27001. This reflects our commitment to risk management, security governance, continuous improvement, and protection of information assets.

  • Formal information security governance and policies
  • Risk assessment and treatment processes
  • Security roles, responsibilities, and internal controls
  • Continuous improvement and control monitoring
  • Operational processes to support confidentiality, integrity, and availability

What you will find here

Customers may request additional compliance or assurance information through our security or support channels, subject to confidentiality and commercial review.

Document / Item Status Access
ISO/IEC 27001 Certification Statement Available Request access
Privacy Policy Public View policy
Security & Compliance Questions Available on request Contact team

Optional improvement: when you have the public certificate PDF or an official attestation letter, replace “Request access” with a direct link to the file.

Security Principles

How we approach security

Governance

Security is supported through defined policies, roles, responsibilities, and management processes designed to maintain strong operational discipline across our services.

Risk Management

We maintain a structured approach to identifying, evaluating, and treating risks that may affect our systems, services, and information assets.

Continuous Improvement

Our security program is reviewed and improved over time to respond to changing threats, business requirements, and operational learnings.

Access Control

Access to systems and information is managed according to business need, defined roles, and internal control requirements.

Confidentiality

We are committed to protecting customer and internal information through documented processes and security controls that support confidentiality.

Availability & Integrity

We work to maintain reliable services and protect the integrity of information through operational safeguards, monitoring, and structured change and control practices.

Privacy

Privacy and data handling

Faraday publishes a Privacy Policy describing how personal information may be collected, used, processed, and protected in connection with its sites and services.

The policy also includes information related to user rights, international data transfers, cookies, contact methods, and privacy-related requests.

Privacy requests

  • Questions about personal data handling
  • Requests related to privacy rights
  • Privacy or data protection concerns
  • Compliance questionnaires related to privacy
support

Communication and support channels

Help Desk

For product or service assistance, customers can use our support portal.

Documentation

Technical documentation and additional product information are available through our docs site.

Security / Compliance Contact

For trust, privacy, or compliance-related requests, please contact our team directly.

If you prefer, this block can be expanded later with SLA language, support hours, incident communications, or dedicated customer success channels.