Compliance & Trust

Enterprise-grade security standards and regulatory alignment.

Global Trade & Export Compliance Active Enforcement

Netra operates under strict adherence to international export control frameworks, ensuring sovereign identity tools are only possessed by authorized entities.

  • U.S. EAR Compliance: Automated screening against sanctioned destinations (Russia, China, Iran, etc.).
  • Anti-VPN Behavioral Filter: Real-time detection of location-spoofing via system metadata auditing.
  • Wassenaar Alignment: Classification as Defensive Security Governance software to maintain global trade standards.

Data Privacy Sovereignty Compliant

Our Zero-Telemetry architecture ensures that you remain the absolute owner and sole processor of your identity data.

  • GDPR Clause 25: Data Protection by Design and by Default.
  • HIPAA Security Rule: Technical safeguards for PHI without third-party exfiltration.
  • Privacy Manifest: Verifiable transparency on data handling practices.
View Manifest

Financial & Audit Control Audit Ready

PCI Compliant (SAQ A)

We leverage industry-leading payment processors to ensure your transactional security.

  • Secure Processing: All transactions are handled by PayPal. Our servers never touch or store credit card numbers.
  • Isolation: Payment flows are handled in secure, provider-hosted environments to prevent data leakage.

Regulatory Frameworks Audit Ready

Netra is designed to satisfy the rigorous audit requirements of modern regulations.

  • ISO 27001 Alignment: Zero-exfiltration architecture simplifies Annex A compliance for operational security.
  • GDPR/CCPA: Minimal data collection principles. No processing of PII from your identity environments.
  • SOC 2 Support: Detailed logging and signed binaries provide the evidentiary support for your trust criteria.

Privacy by Design Zero Egress

Privacy is not a feature; it is the foundation of our entire architecture.

  • No "Phone Home": The tools do not send scan results, domain names, or user lists back to our servers.
  • Local Logic: All heuristics and escalation path logic reside within the executable on your machine.

Need to verify our compliance posture?

Contact Compliance Team