amber protects customer data with a documented security program covering technical and organizational measures — from certified governance and secure cloud infrastructure to access control and data deletion on request.
Independent certifications and EU regulations that govern how amber handles your data and AI.
amber operates a documented ISMS that is audited according to the ISO 27001 standard. Furthermore, amber is developed in accordance with the SOC-2 standard. TOMs are documented in our DPA documents.
Privacy by Design & Default (GDPR Art. 25), deletion on request, and breach reporting under GDPR Art. 33/34, with our DPO involved in relevant cases.
amber is designed to meet the obligations of the EU AI Act, including transparency, accountability, and human oversight across the product.
Built by a European team with subprocessors contractually bound to equivalent EU data protection obligations.
A defense-in-depth approach combining certified standards, strict access controls, isolated infrastructure, continuous patching, full audit logging, and privacy-by-design principles.
Robust safeguards and proven processes to protect your data and ensure business continuity.

Sensitive data can be deleted on request and fully removed from all amber servers. Deletion metadata is logged.

Full backups are created by default for disaster recovery, using documented DR capabilities of the hosting environment.

Incidents are handled through a structured, severity-based process. Breach reporting follows GDPR Art. 33/34. The DPO is involved in relevant cases.

Third-party components are reviewed before use. Subprocessors are contractually bound to equivalent data protection obligations.
Your data. Our responsibility.
We combine strong technical measures with clear processes to keep your data secure and your business resilient.