Security & Compliance
Field data is irreplaceable. FieldTap is purpose-built to protect the records your team collects on-site - location confidentiality, sensitive data controls, role-based access, immutable audit trails, and end-to-end encryption are not add-ons. They are the architecture.
Regulatory Compliance
FieldTap is designed to support compliance with regulations that govern field data collection, environmental reporting, and data privacy across the industries we serve.
| Regulation | Scope | How FieldTap Helps |
|---|---|---|
| NHPA Section 106 | Cultural resources | Immutable audit trails, SHPO-format exports (DPR 523, IMACS, UASF), locked records for defensible documentation |
| NEPA / CEQA | Environmental review | Structured field forms, photo documentation with GPS, chain-of-custody logs for environmental impact assessments |
| ARPA | Archaeological site protection | Location confidentiality controls, sensitivity classification, access-restricted GPS coordinates |
| OSHA 1910 / 1926 | Workplace safety | Daily monitoring forms, inspection records with timestamps, approval workflows for safety sign-offs |
| GDPR | EU data privacy | Data portability (full export), right to deletion, encryption at rest and in transit, role-based access control |
| CCPA | California data privacy | Data access and deletion rights, no sale of personal information, transparent data collection practices |
Our Security Commitment
We understand that you're trusting us with data that represents months or years of fieldwork - data that can never be recollected. That responsibility shapes every decision we make.
Security is not an afterthought at FieldTap - it is built into the database layer. Access controls are enforced by the database itself, not just the application UI. Sensitive data classifications restrict records at the query level. Audit logs are append-only and immutable by design. Location data is never publicly accessible.
Our team regularly reviews security practices and conducts dependency audits. We are actively working toward SOC 2 Type II certification.
If you have questions about our security practices or need a compliance statement for your organization, please contact us.
Report a Vulnerability
Found a security issue? We appreciate responsible disclosure and will work quickly to address any verified vulnerabilities.
Contact Us