Security You Can Verify, Not Just Trust
Know exactly where your data goes, who can access it, and how it is processed.
Security and Control by Design
Full audit trail. Full decision traceability. No data ownership transfer.
Every agent has clear checkpoints. You decide what gets reviewed, what auto-approves, and where the boundaries sit.
Approval thresholds, coding rules, escalation triggers — captured in plain English and enforced consistently.
For every action, you can see where a value came from, which rule was applied, and why the decision was made.
Encrypted in transit and at rest. Never used for model training. Zero retention at the model layer. EU or US residency. GDPR compliant under DPA.
How We Handle Your Data
Transient processing. No data hoarding. Full transparency.
What We Access
Only the data required to execute the agreed workflow. This may include documents, structured ERP data, email content where inbox automation is enabled, and reference data such as vendor lists or chart of accounts.
How We Process It
Processing is real-time and transient. Data is read in memory to execute rules, classification, or extraction logic. Results are written back to your systems. We do not build secondary databases of customer data.
What We Store
Operational logs only. Timestamps, actions, and outcomes required for audit. No raw email content, document attachments, or bank details are retained. Logs are retained while you are a customer.
Encryption
All data is encrypted in transit using TLS 1.2 or higher and encrypted at rest using AES-256. No exceptions.
Data Residency
You choose where your data is processed and stored: the European Union or the United States. Residency is enforced at the infrastructure level. Your data does not leave your chosen region.
AI Processing and Data Controls
AI is used for classification, extraction, and reasoning. This is how data is handled during processing.
Data Is Transient During AI Processing
Enterprise data processing agreements prohibit training on customer data.
Data is processed for the duration of the API request only. It is not stored after a response is returned.
Processing occurs through enterprise-tier APIs with contractual data protection commitments.
Questions About Security?
We can provide our DPA, architecture details, and answer questions from your IT or compliance team.
Book a Demo →