Trust Center
Our commitment to security, privacy, and building technology you can rely on.
π
Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Your information never
travels unprotected.
π‘οΈ
Data Protection
We follow privacy-by-design principles. Data minimization and purpose limitation are core to how we
build products.
π€
Responsible AI
Our AI systems are designed with human oversight. We prioritize transparency, fairness, and
explainability in all AI features.
π
Compliance
We comply with POPIA (South Africa) and GDPR (EU). Your rights as a data subject are our priority.
Security Architecture
We take a defense-in-depth approach to security:
- Infrastructure Security β Hosted on enterprise-grade cloud platforms with DDoS
protection
- Authentication β Multi-factor authentication available, secure session management
- Access Control β Role-based access with principle of least privilege
- Monitoring β 24/7 security monitoring and anomaly detection
- Incident Response β Documented procedures for security incidents
Data Protection Philosophy
We believe you should control your data. Our philosophy:
- Minimal Collection β We only collect what we need
- Purpose Limitation β Data is used only for stated purposes
- Transparency β We're clear about what we collect and why
- User Control β You can access, export, or delete your data
- No Selling β We never sell your personal information
Responsible AI Principles
As we build AI-powered features, we commit to:
- Human Oversight β AI assists, humans decide
- Transparency β Clear when AI is being used
- Fairness β Active monitoring for bias
- Safety β Robust testing before deployment
- Privacy β AI training respects data privacy
Our Promise
Technology should remember you're human. We build with that principle at our core β respecting your time,
your privacy, and your trust.
Uptime & Reliability
We understand that reliability matters:
- Infrastructure designed for high availability
- Geographic redundancy for critical services
- Regular backups with tested recovery procedures
- Status page coming soon for real-time updates
Security Reporting
If you discover a security vulnerability, please report it responsibly:
- Email: [email protected]
- We appreciate responsible disclosure
- We will acknowledge receipt within 48 hours
- We will not pursue legal action against good-faith reporters
πΏπ¦
POPIA Compliant
πͺπΊ
GDPR Compliant
π
TLS 1.3
βοΈ
Enterprise Cloud
Questions?
We're happy to discuss our security practices: