LAST UPDATED: MARCH 2026 · BILDR LABS PTY LTD · ACN 696 230 350 · ABN 80 696 230 350
Bildr is committed to protecting the integrity, availability, and confidentiality of your project data. This document outlines our technical safeguards, backup procedures, disaster recovery capabilities, and data resilience commitments. It supplements our Privacy Policy and Terms of Service.
Bildr is operated by Bildr Labs Pty Ltd (ACN 696 230 350), registered in Australia. Our infrastructure is hosted on enterprise-grade cloud platforms with industry-standard security certifications.
Bildr's architecture is distributed across the following service providers:
| Service | Provider | Region | Purpose |
|---|---|---|---|
| Application hosting | Vercel | US East (Virginia) | Web application, API routes, serverless functions |
| Database | Supabase (PostgreSQL) | US East | All project data, user profiles, authentication |
| File storage | Supabase Storage | US East | Uploaded plans, documents, images |
| AI processing | Anthropic | US | Walkthrough analysis, budget generation, AI chat |
| Payments | Stripe | US | Subscription billing, payment processing |
| Rate limiting | Upstash Redis | US East (Virginia) | Distributed rate limiting, generation locks |
| Error monitoring | Sentry | US | Application error tracking, performance monitoring |
| Resend | US | Transactional and onboarding emails |
All providers are SOC 2 Type II certified or equivalent. Data is encrypted in transit (TLS 1.2+) and at rest (AES-256) across all services. By using Bildr, you consent to your data being transferred to and processed in the United States by these providers, as detailed in our Privacy Policy.
Database backups: Our PostgreSQL database (hosted on Supabase) is backed up daily with automated snapshots. Backups are retained for 7 days, enabling restoration to the most recent daily snapshot in the event of data loss or corruption.
File storage backups: Uploaded documents (architectural plans, engineering reports, site photos) are stored in Supabase Storage with built-in redundancy. Files are replicated across multiple availability zones within the hosting region.
Application code: All source code is version-controlled in a private Git repository. Every deployment is immutable and can be rolled back to any previous version within minutes via the Vercel dashboard.
Payment data: Stripe maintains its own PCI DSS Level 1 certified infrastructure with independent backup and disaster recovery procedures. Bildr does not store credit card numbers, CVVs, or full payment credentials. Only Stripe customer IDs and subscription status are stored in our database.
Our disaster recovery objectives are as follows:
| Metric | Target | Description |
|---|---|---|
| Recovery Point Objective (RPO) | 24 hours | Maximum data loss in a disaster scenario. Daily automated backups ensure recovery to within 24 hours of any incident. |
| Recovery Time Objective (RTO) | Under 4 hours | Target time to restore full service after a major infrastructure failure. |
| Application rollback | Under 5 minutes | Time to revert to a previous working deployment via Vercel. |
Failure scenarios and response:
Encryption: All data is encrypted in transit using TLS 1.2 or higher. Data at rest is encrypted using AES-256 encryption across all storage systems.
Authentication: User authentication is managed by Supabase Auth with bcrypt-hashed passwords. All API endpoints require valid authentication tokens. Service-to-service communication uses separate credentials that are never exposed to clients.
Row-Level Security (RLS): Our database enforces row-level security policies ensuring users can only access their own project data. Even in the event of an application-level vulnerability, the database layer prevents cross-user data access.
Rate limiting: All API endpoints are protected by distributed rate limiting (via Upstash Redis) to prevent abuse and protect against denial-of-service attacks. AI generation routes include spending caps to prevent runaway costs.
Error monitoring: Application errors are tracked in real-time via Sentry with source map support, enabling rapid identification and resolution of issues before they affect users at scale. Service availability is continuously monitored via a public health endpoint at /api/health.
Vulnerability management: Automated dependency scanning (via GitHub Dependabot) monitors all third-party packages for known vulnerabilities. A continuous integration pipeline runs lint, type-checking, and security audits on every code change.
Our data retention policies are detailed in our Privacy Policy. In summary:
In the event of a data breach or security incident, Bildr Labs will:
Security concerns can be reported to support@bildr.au.
Bildr's data protection practices are designed to comply with:
Our third-party service providers (Supabase, Vercel, Stripe, Anthropic) each maintain SOC 2 Type II certification or equivalent, and are contractually bound to maintain appropriate data protection standards.
Bildr's architecture is designed to minimise single points of failure:
This document is reviewed and updated periodically. For questions about our data protection practices, contact support@bildr.au.
© 2026 BILDR LABS PTY LTD · ACN 696 230 350 · ABN 80 696 230 350