CarbonEmit's security controls, certifications, sub-processors and data processing principles on a single page — transparent and auditable.
Last updated: 2026-05-10
Overview
CarbonEmit is a cloud platform that holds enterprise customers' sustainability data in trust. We operate an **ISO/IEC 27001:2022** certified information-security management system; our data-processing operations comply with **KVKK** and **GDPR**. This page provides a summary of CarbonEmit's security posture — supplementary documents and audit reports are shared on request.
Certifications & Compliance
CarbonEmit holds certifications independently audited by accredited third-party bodies.
ISO/IEC 27001:2022
Bilgi güvenliği yönetim sistemi (ISMS) — yazılım geliştirme, bulut altyapı işletim ve müşteri verisi işleme
KVKK
Türkiye 6698 sayılı Kişisel Verilerin Korunması Kanunu uyumlu veri işleme ve VERBİS tescili
GDPR (EU 2016/679)
Avrupa Birliği Genel Veri Koruma Tüzüğü uyumlu veri işleme — AB veri kontrolcüsü müşteriler için
Data Residency
CarbonEmit stores customer data in EU-region data centres (Microsoft Azure — EU West Netherlands and EU North Ireland). Türkiye-resident user data is processed under **KVKK Article 9** (cross-border transfer) with the required explicit consent and data-transfer commitments. For EU data-controller customers, all data stays within EU borders.
Encryption
Customer data is encrypted both in transit and at rest.
Mandatory multi-factor authentication (MFA) for all administrative access
Role-based access control (RBAC) — separate privilege levels for engineering, ops and support
Engineer access to production data only during incident response, with audit logging
Customer SSO (SAML 2.0 / OIDC) available on Professional and Enterprise plans
All authentication events logged for at least 1 year
Incident Response & Notification
On detection of a data breach or security incident, we notify affected customers within **24 hours** and the relevant authorities (KVKK Personal Data Protection Authority for Türkiye, the relevant EU authority for GDPR) within **72 hours**. Our incident response team is on-call 24/7.
Vulnerability Disclosure
If you have discovered a security vulnerability in a CarbonEmit product or our infrastructure, please contact us via the channel below. We acknowledge reports within 1 business day, remediate within 90 days and, with your consent, recognise you on our researcher hall of fame.
Our PGP key is shared on request for sensitive disclosures.
Scope: carbonemit.com, app.carbonemit.com, api.carbonemit.com. For third-party (sub-processor) products, please report to the relevant provider.
Sub-processor List
Up-to-date list of third-party service providers CarbonEmit uses to deliver service. When a new sub-processor is added we notify Enterprise plan customers **30 days** in advance.
Customers can formalise their data-processing relationship with CarbonEmit through Standard Contractual Clauses (SCC) and a KVKK Data Processing Agreement template. Without a signed DPA the customer panel is **not available** — a DPA template is shared on request prior to contract signature.
Quarterly internal security audits and management review
Independent penetration testing at least annually (web + API + cloud infrastructure)
Continuous vulnerability scanning and patching procedure for production environment
Employee training: at onboarding + annual refresh; quarterly phishing simulation
Business Continuity & Backup
Recovery Time Objective (RTO): 4 hours
Recovery Point Objective (RPO): 1 hour (PITR with minute-level backup)
Geographically distributed backup (2 EU regions)
Annual business continuity drill + management report on outcomes
AI and Data Training
CarbonEmit does **not** use customer data under any circumstances to train our own AI models. The in-platform AI assistant (e.g. emission category recommendation engine) operates within the customer's session boundary, and any inputs shared with third-party LLM providers are **anonymised and aggregated**.
Need More Information?
Contact our security team for any specific question — supplementary documents, ISO 27001 certificate copy, sub-processor agreements.