Security

How Jurybox protects your data and supports secure operations
Security at Jurybox

Protecting customer information is a core operating priority. Our controls are designed around secure access, reliable infrastructure, and continuous monitoring to reduce risk across the platform.

SOC 2 Type II: Currently engaged (report in progress)
Governance and Access

• Access to production systems is limited by role and least-privilege principles.

• Team members use strong authentication controls, including support for multi-factor authentication.

• Security responsibilities, account lifecycle controls, and incident response procedures are defined and reviewed.

Infrastructure and Data Protection

• Data is encrypted in transit using TLS and protected at rest by managed cloud controls.

• Jurybox is deployed on hardened cloud infrastructure with environment separation and controlled administrative access.

• Backups and recovery procedures are in place to support resilience and business continuity.

Application Security

• Code changes are reviewed before release and deployed through controlled workflows.

• Dependencies and runtime environments are monitored and updated to address known security issues.

• Security events are logged and monitored to help identify and respond to suspicious activity.

Transparency

Additional security documentation is available through our Trust Center.

If your organization has a security review process, contact us at security@juryboxapp.com.

© 2026 Jurybox Technologies, LLC - All Rights Reserved