Trust Center
Security & Compliance
Our end-to-end commitment to safeguarding your data and building AI that’s secure, accountable and free from bias.

We Take Data Security Seriously
We recognize the vital importance of safeguarding sensitive business and personal data. With years of experience supporting customers in highly complex, regulated industries such as Insurance, Banking & Financial Services, and Healthcare, we have honed our expertise in managing data that requires the highest levels of security.

Protecting Your Data
We understand how important your and your customers' data is to you. It is critical that your infrastructure be built to safeguard it. That is why Roots uses our Microsoft Azure cloud-based platform to ensure that everything it does is completely safe. Your Roots' AI Agents interact with your systems and infrastructure securely through API, VPN, or site-to-site connections—just like a trusted Business Process Outsourcing partner would.
Your Roots AI Agents comply with industry standard security and data privacy protocols. Roots Automation is SOC 2 Type 2 and ISO 27001 certified. Every year we undergo independent audits to verify that we consistently meet the critical controls needed to protect your data. We are also compliant to HIPAA, CCPA, GDPR, and 23 NYCRR 500 standards to protect and safeguard PFI, PHI, and PII.







Cloud-Based Infrastructure: No Hardware to Host
Roots' services are hosted on Microsoft’s Azure and Amazon's AWS cloud platforms. With Roots there is no hardware to host. Everything is delivered as a cloud-based service. We do not run any on-premises routers, load-balancers, DNS servers, or physical servers.
Our infrastructure is spread across multiple geographically distributed data centers in the United States and Europe (depending on customer needs) to offer high availability of services and resiliency in the event of any regional outages. Our servers, applications, and data are kept secure with the latest software, code revisions and security patches, which are reviewed, tested and deployed monthly.
We maintain a hot-hot configuration to deliver high-availability, achieving 99.9% uptime or higher, in line with our cloud providers Service Level Agreements (SLAs).
Data Encryption: Your Data is Always Secure
We use end-to-end 256 AES DOD level encryption. Additional protections are applied when we send or retrieve data from your systems or from the Roots Platform, the communication is always secured through HTTPS encryption.
Next to encrypting data in transit, we also encrypt all data at rest. Our databases, as well as all stored data and documents, are encrypted from the moment we receive your data until deleted. Your login details are one-way hashed using a strong hashing algorithm. Not even our staff can see or access your passwords and keys.

Roots' Commitment to Security: Regular Audits and Employee Training

Regular Security Audits
To maintain the highest level of security, Roots' applications and infrastructure are regularly examined for security vulnerabilities by third-party security firms that perform penetration testing and access checks. In addition, as part of our everyday operations, our Cloud Infrastructure engineering teams monitor system performance and actively manage risks.
Employee Security Training
At Roots, security is everyone’s responsibility. All new and existing employees undergo comprehensive training on data privacy and security. In addition, we conduct refresher courses to ensure our entire team is up-to-date on the latest security practices, maintaining a robust cybersecurity posture throughout the organization.

Building AI Responsibly
At Roots, our singular focus is supporting insurance companies in delivering on their customer promises while keeping the trust and security of our AI at the forefront of everything we do.

