Security & trust

Excise data deserves better than "trust us".

EMS holds the operational chain-of-custody for regulated, excise-stamped goods. Here's exactly how we protect it — where it's hosted, how it's encrypted, who can see it, and how to report a vulnerability.

Practices

How we protect customer data.

Canadian-resident data

Customer Data is hosted in AWS Canada (Central) — Montréal region — with all primary and replica nodes inside Canada. No data leaves Canadian borders without an explicit Enterprise arrangement.

Encryption everywhere

TLS 1.3 in transit, AES-256 at rest. Database snapshots, blob storage (NOA documents, damage photos) and backups are all encrypted with keys managed in AWS KMS.

Multi-tenant isolation

Customer accounts are isolated at the data layer, not just the UI. Customer-portal sub-accounts further restrict consignees to their own slice — they cannot read another consignee's shipments, inventory or reports.

Audit log on every mutation

Every state-changing action — receive a box, complete a stamp run, dispatch an outbound — is logged with user, timestamp and detail. Audit log is append-only and retained for at least 12 months.

Least-privilege access

Production access is restricted to a small set of named engineers. Every production action is logged and reviewed weekly. Customer Data is never accessed without an explicit support ticket.

Backups + tested recovery

Encrypted automated backups every 4 hours, cross-region copies daily. Quarterly disaster-recovery drills (most recently 23 March 2026, completed in 18 minutes) — see the status page.

Authentication you can grow into

Username + password by default with a configurable password policy and 30-minute auto-lock. Single sign-on (SAML, OIDC) available on Pro and Enterprise tiers, with mandatory MFA enforcement at the IdP layer.

Trained team

Annual security training for all staff. Mandatory re-training for anyone with production access. Onboarding includes secure-coding fundamentals and incident-response procedures.

Always-on monitoring

Continuous monitoring of authentication events, abnormal API usage, and infrastructure health. Anomalies page our on-call engineer 24/7. Customer-impacting events are posted to the status page within 15 minutes of detection.

Certifications & standards

Where we stand.

Honest snapshot of our current certifications and their target dates. We update this page as soon as a status changes.

SOC 2 Type II
In progress

Audit period ends Q2 2026; report target Q3 2026.

PIPEDA-aligned
Operational

Canadian privacy law compliance; see privacy policy.

GDPR Data Processor
Operational

DPA available on request — see terms § 7.

ISO 27001
Target Q1 2027

Aligning controls during the SOC 2 cycle for streamlined audit.

For Enterprise customers we maintain a current internal security report covering controls, policies and architecture, available on request under NDA. Contact admin@excisems.com.

Incident response

When something does go wrong.

We treat security incidents the same way we treat compliance — visibly, accountably, and on a clock. Our response runbook is rehearsed quarterly.

Detect → notify within 1 hour

Internal escalation and on-call paging within 15 minutes; the status page posts an "investigating" entry within an hour of confirming customer impact.

Customer notification within 24 hours

Affected customers receive a direct email within 24 hours of the incident being declared, with a plain-English summary of what we know and don't know yet.

Post-incident review within 7 days

Every customer-impacting incident gets a public post-mortem on the status page within seven days — root cause, customer impact, timeline, prevention actions.

Regulatory notification where required

If an incident involves personal information of EU/UK or CA data subjects, EMS will notify the relevant supervisory authority within the windows required by GDPR and PIPEDA respectively, and assist customers with their downstream obligations.

Report a vulnerability

If you've found a security issue in EMS, please report it directly. We don't pursue good-faith researchers, and we acknowledge every valid report.

PGP keyAvailable on request for sensitive disclosures.
Response timeAcknowledged within 2 business days, triaged within 5.
Safe harbourGood-faith research is welcomed. Don't access other customers' data, don't disrupt service, and we won't pursue legal action.
Contact security

Need our security report?

Enterprise customers can request our current internal security report under NDA — covers controls, policies, and architecture diagrams.

Request the report See system status