... Skip to content

InspireIP Trust Center

At InspireIP, trust isn’t an add-on, it’s the foundation of our platform.

We believe Intellectual Property deserves more than storage, it deserves uncompromising protection. As a platform designed to simplify and accelerate IP operations, we place security, privacy, and compliance at the core of everything we build.

That’s why security, privacy, and compliance are woven into every layer of our product, from infrastructure to product design to internal operations.

With deep expertise in IP workflows and secure digital infrastructure, InspireIP ensures your disclosures, ideas, and sensitive documents remain safe, encrypted, and fully controlled. Our systems are engineered to meet the highest standards of data protection while delivering the speed and usability modern R&D, legal and innovation teams need.

Our mission is simple: empower organizations to collaborate, manage, and innovate with confidence – knowing their IP lifecycle is guarded by enterprise-grade security, transparent policies, and reliable compliance measures.

Compliances (4)

ISO 27001
ISO 9001
VAPT Security Tested

Subprocessors (10)

GitLab

Development software

AWS

IT infrastructure

New relic

Development software

HubSpot

Sales

Teleport

IT Management

Sentry

Analytics

PQAI

Patent Tool

Resources (37)

System Acquisition and Development Lifecycle Policy

 

Compliance Procedure

 

Asset Management Policy

System Description

Pentest Report

How does InspireIP leverage AI within the product?
Does InspireIP encrypt data at rest?

All datastores with customer data, in addition to S3 buckets, are encrypted at rest. Sensitive collections and tables also use row-level encryption.

This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, is enough to read the most sensitive information.

How does InspireIP encrypt data in-transit?
 
Where can I find InspireIP's Responsible Disclosure Policy?

InspireIP's Responsible Disclosure Policy can be found here: Responsible Disclosure Policy.

How do you monitor for security breaches?

Automated monitoring is enabled that include alerts to security personnel based on certain rules/thresholds.

In addition to the daily oversight, ongoing vulnerability assessments, and use of alerts provides further security monitoring through the security function, which performs periodic audits and information security assessments.

Powered by

Subscribe to Trust Center Updates

Subscribe to get notifications about important update to InspireIP's compliance journey.
By signing up for email notifications you agree to the privacy policy.

InspireIP has restricted access for 'System Acquisition and Development Lifecycle Policy'. We need your work email to validate OR request your access to this item.