Security is the foundation, not the marketing.
Every bullet below is a real thing we built, not a sticker. We write this calmly because the work itself is calm.
Multi-tenant isolation
Each business has its own data slice; the repository layer prevents cross-tenant reads or writes.
Field-level encryption of PII at rest
Names, phone numbers and addresses are encrypted with AES-GCM before they touch the database.
Consent-required recording
Recording starts only when consent is captured. Every recording access is short-lived and audited.
Defence-in-depth on the LLM
Prompt-injection, jailbreak and prompt-leakage detectors run alongside cross-tenant retrieval checks.
SSRF defence on outbound webhooks
Outgoing calls to your integrations go through an allow-list checker — no internal address slipping out.
Append-only audit logs
Every privileged action is recorded with actor, time and reason. Nothing in the audit trail is editable.
Seven-day cool-off on data deletion
A tenant-delete is a deliberate, reversible request — not a one-click loss.
For the legal mechanics, see our privacy policy and the data processing addendum.