Payment options
Supported currencies
- USD
- EUR
- GBP
- KRW
Accepted methods
- Wire transfer
- ACH where available
- Card via payment provider
- Enterprise purchase order

Americas onboarding
A detailed onboarding guide for U.S. clients covering NDA, MSA, SOW, IP, payments, privacy review, California privacy readiness, security review, and procurement support. This page helps your legal, procurement, security, privacy, finance, and engineering teams understand what is available before contract, what requires NDA, and what is finalized only in signed agreements.
This page is a general onboarding guide for clients located in United States. It is not legal, tax, regulatory, cybersecurity, financial, or compliance advice. Final rights, responsibilities, IP ownership, security commitments, privacy commitments, data handling, payment terms, and service obligations are governed only by signed documents.
Detailed review pages
Use these focused pages when legal, procurement, security, privacy, finance, or engineering teams need deeper detail than a country summary can safely hold.
Confidentiality process before product, security, architecture, commercial, or procurement details are shared.
Master services framework for payment, confidentiality, IP, security, privacy, liability, termination, and order of precedence.
Project-specific scope, deliverables, milestones, acceptance criteria, assumptions, dependencies, support, and change control.
Personal-data processing terms, instructions, security measures, subprocessors, transfers, support rights, and deletion/return.
Country-aware currency, invoice, purchase order, card provider, wire transfer, tax, fee, and refund/credit review path.
How client-specific deliverables, VarenyaZ background materials, open-source software, AI-assisted outputs, and payment-conditioned assignment are separated.
Secure design, peer review, testing, dependency scanning, secret scanning, CI/CD controls, release approval, and vulnerability remediation.
Public, on-request, NDA-required, legal-review, and contract-only materials organized for legal, procurement, security, and finance reviewers.
Process
The goal is to make every step predictable for buyers, legal teams, procurement teams, and technical reviewers before work begins.
Before the first call
We identify service fit, country availability, regulated data, security review needs, procurement requirements, AI use case, data residency needs, and whether an NDA should come first.
Before detailed sharing
A mutual NDA is available before confidential project, product, security, architecture, roadmap, budget, customer, or data details are exchanged.
Before proposal
The discovery process captures objectives, users, scope, existing systems, integrations, data types, security expectations, accessibility needs, timeline, and acceptance criteria.
Before signature
The contracting package defines services, deliverables, payment, IP, confidentiality, security, privacy, change control, acceptance, support, and offboarding obligations.
Before kickoff
We confirm project owners, communication cadence, repository/cloud access, security boundaries, release process, reporting, decision logs, escalation path, and production access rules.
After delivery
The project closes through launch support, documentation, repository or cloud handover, access revocation, credential rotation, data return/deletion, and support transition.
Before contract
Some materials are public. Some are available on request. Sensitive security evidence is NDA-controlled, and client-specific obligations belong in signed agreements.
| Document | Purpose | Status | Access | Details |
|---|---|---|---|---|
| Mutual NDA | Confidential technical, commercial, security, and product discussions before scope is finalized. | Available | On request | View details |
| Master Services Agreement | Master legal framework for services, payment, confidentiality, IP, limitations, and project governance. | Available | On request | View details |
| Statement of Work | Project-specific scope, assumptions, timeline, deliverables, pricing, acceptance criteria, and dependencies. | Available | After discovery | View details |
| Data Processing Agreement | Personal-data processing terms when VarenyaZ processes personal data on behalf of a client. | Available when applicable | Legal review | View details |
| Security Overview | High-level summary of secure delivery, access control, cloud security, backups, and incident handling. | Available | Public | View details |
| SOC 2 Readiness Summary | Readiness-oriented control posture summary. No SOC 2 certification or audit claim is made. | In progress | NDA required | View details |
| ISO/IEC 27001 Roadmap | Roadmap for ISMS maturity. No ISO/IEC 27001 certification claim is made. | In progress | NDA required | View details |
| Technical Discovery Form | Structured project, data, security, privacy, integration, accessibility, and delivery intake. | Available | Public | View details |
Commercial setup
Payment terms should be confirmed before kickoff so procurement, finance, legal, and delivery teams do not block each other later.
Supported currencies
Accepted methods
Where card payments are supported, card details are processed by the payment provider. VarenyaZ does not intentionally store full payment card details in its own systems. Taxes, VAT, GST, withholding, bank fees, purchase-order rules, and invoice requirements should be confirmed by the client and reflected in the applicable agreement or invoice process.
Privacy
Privacy obligations depend on project role, data categories, data subject locations, subprocessors, cloud regions, support model, and contract terms.
Discovery
The technical discovery process turns a loose idea into contract-ready scope, risk review, architecture decisions, and delivery assumptions.
Do not submit passwords, API keys, private keys, production secrets, sensitive regulated data, or confidential customer data through public forms.
Use this form to request NDA, MSA, SOW, DPA, payment setup, security review, and technical discovery in one structured intake.
Estimated routing
Do not submit passwords, API keys, private keys, production secrets, regulated data, or confidential customer records.
Country review flags
One form, multiple onboarding paths
Required fields are marked with an asterisk. We use these answers to route NDA, contract, privacy, security, payment, and technical discovery review.
Security and delivery
Public pages provide a safe high-level view. Detailed security questionnaires, control mappings, implementation evidence, diagrams, and incident playbooks may require NDA.
Security requirements, secure design review, peer review, testing, dependency scanning, secret scanning, CI/CD controls, release approval, and post-release monitoring are selected based on risk and scope.
Pull requests, reviewer assignment, protected branches, automated checks, sensitive-change review, AI-generated code review, dependency review, and emergency-change handling are built into delivery governance.
Access is granted by role, project need, named accounts, least privilege, MFA where supported, client approval for production access, temporary access, logging, periodic review, and offboarding revocation.
Cloud responsibilities depend on client-owned or VarenyaZ-managed environments and may include IAM, regions, network boundaries, secrets, encryption, logging, environment separation, patching, and handover.
Backup frequency, retention, encryption, location, restore testing, RTO, RPO, DR owner, production recovery, and client-cloud responsibilities are defined per project and contract.
Web and API projects can use OWASP Top 10 awareness, ASVS-inspired verification, input validation, output encoding, auth review, access-control testing, file-upload review, and security regression tests.
Readiness without overclaiming
These are intentionally careful public claims. Formal certification or audit status should never be implied before it exists.
VarenyaZ is not currently SOC 2 certified or SOC 2 audited. We are building a SOC 2 readiness program and can share selected readiness materials under NDA where appropriate.
VarenyaZ is not currently ISO/IEC 27001 certified. We are developing an ISO 27001 roadmap and will not claim certification unless certification is completed by an accredited certification body.
Access levels
This split makes onboarding transparent without exposing sensitive security details or accidentally creating legal obligations outside signed documents.
Local overlay
These notes help buyers identify local questions early. They do not replace legal, tax, privacy, procurement, or security review.
Buyer questions
Yes. VarenyaZ can provide a mutual NDA or review a client-provided NDA before confidential technical, commercial, security, or product details are exchanged.
Yes. An MSA template is available on request. A project-specific SOW is usually prepared after discovery because scope, assumptions, payment, acceptance, and dependencies need project context.
Final ownership is governed by the signed MSA and SOW. Client-specific deliverables can be assigned or licensed as agreed, while VarenyaZ background technology, reusable methods, templates, tools, and know-how are not automatically transferred.
No. VarenyaZ is not currently SOC 2 certified or SOC 2 audited. We are building a SOC 2 readiness program and can share selected readiness materials under NDA where appropriate.
No. VarenyaZ is not currently ISO/IEC 27001 certified. We are developing an ISO 27001 roadmap and will not claim certification unless certification is completed by an accredited certification body.
Yes, when appropriate. Access should be granted through named accounts, least privilege, MFA where supported, client-approved scopes, audit logging, temporary access rules, and offboarding revocation.
Send your country, service need, timeline, procurement requirements, security review needs, and whether you need NDA first. We will route the request to the right commercial, technical, privacy, or security review path.