Sorting by

×

Security Features

No Training on Your Data

Security and Privacy First

 Your content is your competitive advantage, so mPro Digital uses robust security and encryption and ZERO Retention Policies to protect your data and preserve complete confidentiality.

Here’s a summary of how we address key security concerns:

01

CSRF Protection

Laravel implements CSRF protection automatically for forms, which helps prevent unauthorized requests.

02

SQL Injection Prevention

Using a query builder that employs parameter binding significantly reduces the risk of SQL injection, ensuring that user inputs are properly escaped.

03

Authentication System

Laravel features a robust authentication system that simplifies handling user authentication while securely hashing passwords using the bcrypt algorithm.

04

Data Encryption

The framework utilizes OpenSSL to encrypt sensitive data, enhancing overall security.

05

Password Hashing

Integrated bcrypt password hashing provides a strong defense against password cracking attempts.

06

Secure Routing and Middleware

Middleware allows developers to define access control for routes, restricting access to authorized users only.

Enterprise-Grade Security & Compliance

Our Commitment to Your Data Security

At mPro Digital Edge, we understand that you’re trusting us with sensitive property data, resident information, and confidential business operations. Security isn’t an afterthought—it’s built into everything we do.

Built on Microsoft Azure Enterprise Infrastructure

mPro Digital Edge is hosted on Microsoft Azure, the cloud platform trusted by 95% of Fortune 500 companies. We leverage Azure’s enterprise-grade security infrastructure, including:

Military-grade encryption for all data at rest and in transit (AES-256, TLS 1.2+)

Multi-factor authentication is required for all administrative access

24/7 threat detection powered by Microsoft Defender for Cloud

Automated backups with 7-day retention and point-in-time recovery

Azure Application Gateway with Web Application Firewall (WAF)

Azure DDoS Protection Standard on all public endpoints

Azure NAT Gateway for secure outbound connectivity

Private endpoints ensure that databases are not internet-accessible

Geo-redundant infrastructure in West US 2 region

Azure-Native Security Protection

Every component of mPro Digital Edge leverages Azure’s integrated security services:

Azure Application Gateway WAF – Blocks OWASP Top 10 vulnerabilities and common web attacks

Azure DDoS Protection Standard – Protects against volumetric and protocol attacks

Azure NAT Gateway – Secure, scalable outbound internet connectivity

Network Security Groups (NSGs) – Firewall rules controlling all network traffic

Azure Key Vault – Hardware-secured storage for all secrets and encryption keys

Microsoft Defender for Cloud – Continuous security posture assessment and threat detection

Current Compliance Status

We are actively pursuing SOC 2 Type II certification (expected completion: Q2 2025).

Our platform is designed and built from day one to meet SOC 2 requirements, including:

Comprehensive audit logging (365-day retention)

Quarterly access reviews and least-privilege access controls

Incident response procedures and disaster recovery planning

Regular security training for all team members

Third-party penetration testing (scheduled quarterly)

Continuous security monitoring via Microsoft Defender for Cloud

Vendor risk management (all AI providers are SOC 2 certified)

Current compliance frameworks implemented:

Azure Security Benchmark

NIST Cybersecurity Framework

OWASP Top 10 Web Application Security

Fair Housing Act AI compliance requirements

Your Data is Protected

Data Encryption:

All data encrypted at rest using AES-256 encryption

All data encrypted in transit using TLS 1.2 or higher

Encryption keys managed in Azure Key Vault with hardware security modules

Key Vault audit logging tracks all secret access

 

Access Controls:

Role-based access control (RBAC) – users only see what they need

Multi-factor authentication required for all admin accounts

Just-in-time privileged access management

All access logged and monitored in Log Analytics (365-day retention)

 

Network Security:

Private endpoints for databases (not accessible from internet)

Azure Application Gateway WAF blocking malicious traffic

Azure DDoS Protection Standard with automatic mitigation

Network Security Groups (NSGs) controlling all traffic flows

Azure NAT Gateway for secure outbound connectivity

 

Data Privacy:

Your data is YOUR data – we never sell or share customer data

Data residency in US-based Azure data centers (West US 2)

GDPR and CCPA privacy controls built-in

Clear data retention and deletion policies

 

Regular Security Testing

We don’t just set up security and forget about it. Our platform undergoes:

Continuous monitoring – 24/7 automated threat detection via Microsoft Defender

Weekly vulnerability scans – automated security assessments

Quarterly penetration testing – independent security experts attempt to break in

Monthly backup restore tests – ensuring we can recover your data if needed

Annual third-party security audits – independent verification of our controls

 

AI Provider Security

All AI providers integrated into mPro Digital Edge maintain enterprise security:

OpenAI – SOC 2 Type II certified

Anthropic (Claude) – SOC 2 Type II certified

Google (Gemini) – ISO 27001, SOC 2, SOC 3 certified

HeyGen – SOC 2 Type II certified

Synthesia – SOC 2 Type II certified

ElevenLabs – SOC 2 Type II certified

 

Your prompts and data are NOT used to train AI models – we’ve negotiated data processing agreements with all providers ensuring zero-retention policies.

 

Incident Response

In the unlikely event of a security incident:

  1. Immediate detection – automated alerts via Microsoft Defender to our security team
  2. Rapid response – incident response within 15 minutes
  3. Transparent communication – affected customers notified within 24 hours
  4. Root cause analysis – comprehensive investigation and remediation
  5. Continuous improvement – security controls updated to prevent recurrence

 

Questions About Security?

We’re happy to discuss our security architecture in detail:

Security documentation available for enterprise customers

Architecture diagrams and data flow documentation

Completed security questionnaires (CAIQ, SIG, VSA)

Direct access to our technical team for security discussions

Contact us: info@mprodigitaledge.com

Last updated: November 2025

Our commitments

Our commitments give you ownership and control over your business data (inputs and outputs from ChatGPT Team, ChatGPT Enterprise, ChatGPT Edu, Claude, Gemini, and our API Platform) and support your compliance needs.

Ownership

Control

Security

Faq

Security Policy - mPro Digital Edge Platform

Security Policy - mPro Digital Edge Platform

Enterprise Security for Multifamily Operations

The mPro Digital Edge Platform provides enterprise-grade security designed specifically for multifamily property management companies. Unlike consumer AI tools that create shadow IT risks, our platform delivers comprehensive security controls that meet the stringent requirements of property management portfolios handling sensitive resident data, financial information, and proprietary business intelligence.

Reporting Security Vulnerabilities

Contact Information

Security Team Email: security@mprodigitaledge.com
Response Time: Within 24 hours for critical vulnerabilities
Escalation: For urgent security matters requiring immediate attention, contact our CTO directly

Responsible Disclosure

We appreciate security researchers who help us maintain the highest security standards. When reporting vulnerabilities:

  1. Provide detailed reproduction steps
  2. Include affected components and potential impact assessment
  3. Allow reasonable time for remediation before public disclosure
  4. Work with our security team to validate fixes

Security Architecture

Multi-Layered Defense Strategy

API Security

  • Token-based authentication across 25+ integrated AI providers
  • Encrypted API key storage with role-based access controls
  • Rate limiting and usage monitoring for all external API calls
  • Secure credential management for OpenAI, Anthropic, Google Gemini, HeyGen, Synthesia, ElevenLabs, and Fal.AI integrations

Data Protection

  • End-to-end encryption for all data in transit (TLS 1.3)
  • AES-256 encryption for data at rest
  • Segregated data storage per property management company
  • No commingling of client data across portfolios

Infrastructure Security

  • Migration to Microsoft Azure for enhanced security controls
  • SOC 2 Type I certification in progress (3-6 month timeline)
  • Web Application Firewall (WAF) protection
  • DDoS mitigation and intrusion detection systems

Compliance Framework

SOC 2 Certification Path

Our commitment to achieving SOC 2 Type I certification demonstrates our dedication to enterprise security standards. This certification validates our controls for:

  • Security: Protection against unauthorized access
  • Availability: Consistent system performance and uptime
  • Processing Integrity: Accurate and authorized data processing
  • Confidentiality: Protection of confidential information
  • Privacy: Personal information handling per commitments

Industry-Specific Compliance

Fair Housing Act Compliance

  • AI model governance ensuring compliance with HUD's May 2024 guidance
  • Audit trails for all AI-generated content
  • Bias detection and mitigation in automated responses

Property Management Data Standards

  • PCI DSS compliance for payment processing integrations
  • CCPA/GDPR compliance for resident data handling
  • State-specific privacy law adherence

Access Control

Role-Based Security Model

Enterprise Administration

  • Centralized user management for property portfolios
  • Granular permission settings per role (Regional Manager, Property Manager, Leasing Agent, Marketing)
  • Single Sign-On (SSO) integration capabilities
  • Multi-Factor Authentication (MFA) enforcement

Audit and Monitoring

  • Comprehensive activity logging for all user actions
  • Real-time security event monitoring
  • Monthly security audit reports for enterprise clients
  • Suspicious activity detection and alerting

Data Residency and Privacy

Data Handling Principles

Data Minimization

  • Collection limited to essential operational data
  • Automatic data retention policies
  • Secure data deletion procedures

Geographic Considerations

  • Data residency options for enterprise clients
  • Compliance with regional data protection regulations
  • Transparent data processing locations

Third-Party Security

Vendor Risk Management

All integrated AI providers undergo security assessment:

  • Verification of security certifications
  • Regular security posture reviews
  • Contractual security requirements
  • Incident notification agreements

API Integration Security

Provider-Specific Controls:

  • OpenAI: Enterprise agreement with data processing addendum
  • Anthropic: Claude API with no training on customer data
  • Google Gemini: Enterprise workspace integration
  • HeyGen/Synthesia: Secure video processing pipelines
  • ElevenLabs: Voice data protection protocols

Incident Response

Response Procedures

  1. Detection: Continuous monitoring for security events
  2. Assessment: Immediate evaluation of severity and impact
  3. Containment: Rapid isolation of affected systems
  4. Remediation: Swift patching and vulnerability resolution
  5. Communication: Transparent client notification per SLAs
  6. Post-Incident: Comprehensive review and process improvement

Service Level Agreements

  • Critical vulnerabilities: 4-hour response time
  • High severity issues: 24-hour response time
  • Medium/Low severity: 72-hour response time

Development Security

Secure Development Lifecycle

Code Security

  • Peer code review requirements
  • Static application security testing (SAST)
  • Dynamic application security testing (DAST)
  • Dependency vulnerability scanning

Laravel Framework Security

  • Regular framework updates
  • Security middleware implementation
  • CSRF protection on all forms
  • XSS prevention measures

Employee Security

Security Training

  • Mandatory security awareness training for all staff
  • Role-specific security protocols
  • Regular phishing simulation exercises
  • Incident response team training

Background Verification

  • Comprehensive background checks for all employees
  • Confidentiality agreements
  • Security clearance for infrastructure access

Physical Security

Data Center Security

Upon Azure migration:

  • Tier 3+ data center facilities
  • 24/7 physical security monitoring
  • Biometric access controls
  • Environmental controls and redundancy

Business Continuity

Disaster Recovery

  • Recovery Time Objective (RTO): 4 hours
  • Recovery Point Objective (RPO): 1 hour
  • Daily automated backups
  • Geographically distributed backup storage
  • Regular disaster recovery testing

High Availability

  • 99.9% uptime SLA for enterprise clients
  • Load balancing across multiple availability zones
  • Automatic failover capabilities
  • Real-time replication for critical data

Security Monitoring and Metrics

Key Security Indicators

Monthly reporting includes:

  • Security incident metrics
  • Patch management compliance
  • Access control audit results
  • API security monitoring statistics
  • Training completion rates

Continuous Improvement

  • Quarterly security assessments
  • Annual penetration testing
  • Regular security control reviews
  • Industry benchmark comparisons

Client Security Resources

Security Best Practices

We provide comprehensive security guidance for:

  • User access management
  • Password policies
  • Data classification
  • Incident reporting procedures
  • Security awareness materials

Security Documentation

Available to enterprise clients:

  • Security architecture diagrams
  • Compliance attestations
  • Security audit reports
  • Incident response procedures
  • Data flow documentation

Version History

  • v1.0 - Initial security policy establishment
  • v1.1 - SOC 2 compliance roadmap addition
  • v1.2 - Azure migration security enhancements
  • Current - v1.3 - Enhanced third-party integration controls

Questions and Support

For security-related questions or concerns not covered in this document, enterprise clients can contact their designated Customer Success Manager or reach our security team directly at security@mprodigitaledge.com.


This security policy is reviewed quarterly and updated as needed to reflect evolving security requirements and industry best practices specific to multifamily property management operations.

Last Updated: November 2025

Does this system train its models by using my data?

By default, we do not use your business data to train our models. However, if you have explicitly opted in to share your data with us (for example, through our opt-in feedback system to improve our services), we may use the shared data to train our models.

Who owns my input and out put?

As between you and our AI platforms: you retain all rights to the inputs you provide to our services and you own any output you rightfully receive from our services to the extent permitted by law. We only receive rights in input and output necessary to provide you with our services, comply with applicable law, and enforce our policies.

Can you support my complaince with GDPR and other privacy laws?

Yes, we are able to execute a Data Processing Addendum (DPA) with customers for that use of ChatGPT Team, ChatGPT Enterprise, ChatGPT Edu, and the API in support of their compliance with GDPR and other privacy laws. Please complete our DPA form to execute a DPA with OpenAI.

Why do you only allow business emails for sign up

Sign Up with Your Business Email

We accept corporate email addresses only. Free email providers (such as Gmail, Yahoo, Outlook.com) are prohibited.

Why business emails only?
- Ensures authentic business identity verification
- Protects sensitive property and resident data
- Maintains professional industry standards
- Prevents unauthorized access to confidential multifamily data

Options to get started:
- Sign in with your business email
- Connect with LinkedIn

Need an exception? Submit a request through our business verification form.

Your security matters: Business email requirements help us maintain a trusted network of verified multifamily professionals while protecting sensitive property information and resident data from potential misuse.

We do not accept Gmail, Outlook.com, Yahoo Mail, Zoho Mail, AOL Mail, iCloud Mail, or Yandex, Mailfence, Neo Mail, Apple, GMX, Mail.com, Proton Mail, Tutanota, Mailfence, Neo, and Yandex. Mail, Titan, Fastmail, Minute Mail, Tuta and Hushmail.

Sign in with Linkedin or register with our support department by completing this form.

error: Hands off! This content's got an AI force field.