Our Commitment
Life science organizations trust Prendio to manage critical procurement workflows. That trust is the foundation of everything we build.
Our philosophy is simple: We protect your data with enterprise-grade security, we're transparent about how we handle it, and we continuously validate our controls through independent audits.
We don't just meet compliance standards—we embed privacy and security into the design of our platform from the ground up, adhering to principles of data minimization, least-privilege access, and defense in depth.
OUR PRINCIPLES
We hold ourselves to these principles in every decision we make about your data.

Independently audited by MD Advisors for security, availability, confidentiality, processing integrity, and privacy. Examination period: December 2024 – November 2025.
AICPA Attested
Independently audited by Ernst & Young LLP for internal controls over financial reporting. Covers the Prendio and BioProcure procurement system.
EY Audited
Full compliance with the EU General Data Protection Regulation, including Records of Processing Activities (ROPA), data subject rights, and cross-border transfer safeguards.
EU Privacy
Full compliance with the California Consumer Privacy Act, including consumer rights, records of processing, and transparent data handling practices.
CA Privacy
Security Architecture
All data at rest stored on encrypted volumes using Prendio-managed encryption keys via AWS KMS
All data in transit encrypted end-to-end using strong protocols, key exchange, and cipher suites
Volume encryption keys protected by privileged-only access controls
Encryption key deletion renders data permanently inaccessible when required
Production access restricted to limited authorized personnel for troubleshooting purposes
Customer data logically separated by unique identifier, enforced at the API layer
All database queries scoped to authenticated account identifier
All production system access is logged and reviewed by the security team
CloudWatch and New Relic for real-time infrastructure and application monitoring
Security agents on production systems generating alerts on suspicious activities
Vulnerability scanning, intrusion detection/prevention (IDS/IPS), and anti-malware systems
File integrity monitoring and automated incident alerting via text, chat, and email
Hosted on Amazon Web Services (AWS) with multi-region replication for redundancy
Automated disaster recovery scripts with tested failover to alternate cloud environments
24-hour recovery time objective with tabletop and technical DR testing conducted annually
Annual penetration testing (infrastructure and application) validated by independent certificates
DATA LIFECYCLE
Your data follows a clearly defined lifecycle with protections at every stage.
Data collected only as necessary for business purposes. Classified according to sensitivity. Personal data processed under a lawful basis per GDPR and CCPA.
Encrypted at rest and in transit. Logically segregated per customer. Stored on AWS with redundancy across multiple regions. Accessible only to authorized systems.
Your data is retained for the full duration of your active account. Upon account closure, personally identifiable information is handled in accordance with GDPR and CCPA requirements. Retention schedules are applied per data type, regulatory obligations, and contractual terms.
Your Rights
If you are located in the European Economic Area, you have the following rights regarding your personal data:
Right to access your personal data
Right to rectification of inaccurate data
Right to erasure ("right to be forgotten")
Right to restrict processing
Right to data portability
Right to object to processing
Right to withdraw consent at any time
Right to lodge a complaint with a supervisory authority
If you are a California resident, you have the following rights regarding your personal information:
Right to know what personal information is collected
Right to know whether your data is sold or disclosed
Right to say no to the sale of personal information
Right to request deletion of your personal information
Right to equal service and price (no discrimination)
Right to designate an authorized agent for requests
Third Parties & Sub-Processors
We only work with trusted sub-processors who meet our stringent security requirements.
All sub-processors are bound by data processing agreements.
| Sub-Processor | Purpose | Location |
| Amazon Web Services (AWS) | Cloud hosting & infrastructure | United States |
| New Relic | Analytics, monitoring & performance | United States |
| Drata | Continuous compliance monitoring | United States |
| HubSpot, Inc. | Support ticket & marketing platform | United States |
Questions?