Skip to main content

Security

Keeping our customers’ data secure is top priority. We employ rigorous security measures at the organizational, architectural, and operational levels to ensure that data, applications, and infrastructure remain safe. Our employees across all levels go through rigorous security, privacy, and compliance training.

360 circle which shows forest around the sea

Not Just Basic Security Protocols

Take advantage of enhanced security measures that Equilibrium provides as a part of FiscalNote. The system is designed to meet stringent security requirements of global organizations and governments alike.

End-to-End Encryption icon

End-to-End Encryption

Secure Communication and Access icon

Secure Communication and Access

Threat Monitoring icon

Threat Monitoring

Regular Software Updates icon

Regular Software Updates

Anti-Phishing and Spam icon

Anti-Phishing and Spam

Malware Prevention icon

Malware Prevention

Data Deletion icon

Data Deletion

Data Backups icon

Data Backups

Recovery Point Objective (RPO) and Recovery Time Objective (RTO) performance icon

Recovery Point Objective (RPO) and Recovery Time Objective (RTO) performance

Independent Vulnerability Assessments icon

Independent
Vulnerability
Assessments

End-to-End Encryption icon

End-to-End Encryption

Secure Communication and Access icon

Secure Communication and Access

Threat Monitoring icon

Threat Monitoring

Regular Software Updates icon

Regular Software Updates

Independent Vulnerability Assessments icon

Independent
Vulnerability
Assessments

Anti-Phishing and Spam icon

Anti-Phishing and Spam

Malware Prevention icon

Malware Prevention

Data Deletion icon

Data Deletion

Data Backups icon

Data Backups

Recovery Point Objective (RPO) and Recovery Time Objective (RTO) performance icon

Recovery Point Objective (RPO) and Recovery Time Objective (RTO) performance