Trust Center
Security & Trust
Last Updated: 2026-05-15
Cited handles customer-supplied site content and AI-query metadata. We treat protecting that data as a first-class engineering responsibility. This page summarizes our security posture so procurement, compliance, and security teams have what they need to evaluate Cited.
1. Encryption in transit and at rest
All traffic between your browser and Cited is served over TLS 1.2 or higher. Customer data persisted in our managed databases and object storage is encrypted at rest using AES-256.
Internal service-to-service traffic inside the Cited platform runs over the AWS private network and is also encrypted in transit.
2. Access controls
Production systems are restricted to a small set of Cited engineers under role-based access control. Access is reviewed periodically and revoked promptly when role changes warrant it.
- MFA required for all production-system access.
- Audit logs retained for production access events.
- Customer-tenant isolation enforced at the database row-level and at the API authentication boundary.
3. Data retention and deletion
Customer-supplied business data (sites you've added, audits you've run, recommendations generated) is retained for the lifetime of your account and is removable on request.
- Delete a business from the app and its associated audits and recommendations are permanently removed within 30 days.
- Close your account and we initiate full data deletion within 30 days, except for records we are required to retain (e.g., billing records under tax law).
- Backups are rotated on a fixed schedule; deleted data ages out of backups within the rotation window.
4. GDPR readiness
Cited is structured to support GDPR Data Subject Access Requests (DSARs) including access, rectification, deletion, and portability.
- Data export available on request — emails to [email protected] are routed to an engineering owner.
- We act as a data processor under the GDPR with respect to information you input about your business or your customers' sites.
- A standard DPA is available for enterprise customers.
5. SOC 2 posture
Cited's security program is structured around the SOC 2 Trust Services Criteria. We are working toward SOC 2 Type II certification and can provide our current security policy summary, posture overview, and remediation plan to prospects under NDA.
6. Subprocessors
Cited uses a small number of established subprocessors to deliver the platform. The current list:
- Amazon Web Services (AWS) — primary infrastructure (compute, database, object storage).
- Stripe — billing and subscription management.
- SendGrid — transactional email.
- Google (Tag Manager, Analytics) — usage analytics on marketing pages only.
7. Vulnerability reporting and incident response
We welcome reports of security issues. Email [email protected] with a description of the issue and reproduction steps. We aim to triage within two business days.
- We commit to investigating reports in good faith.
- We will not pursue legal action against researchers who follow responsible-disclosure practices.
- In the event of a material security incident affecting customer data, we will notify affected customers without undue delay.
8. Contact
Security inquiries, compliance documentation requests, and incident reports:
- Cited Inc.
- Email: [email protected]
- Website: https://youcited.com