
Security
Last Updated: February 2026
Compliance & Certifications
We maintain rigorous compliance standards ensuring data protection. Your data never trains our AI models.

SOC 2 Type I: Compliant
SOC 2 Type II: Compliant
Audit period: August 20, 2025 – November 19, 2025 · Johanson Group LLP
Our Commitments
- 1
You own your inputs and outputs.
- 2
Data is not retained any longer than you choose to keep it on our platform.
- 3
No models are ever trained on your data.
- 4
Database access is restricted and monitored.
Security Architecture
- 1
Data encryption at rest (AES-256) and in transit (TLS 1.2+).
- 2
Fully separate databases / storage for different tenants for increased data isolation.
- 3
Enterprise-level authentication through Clerk.
- 4
Regular security audits and penetration testing.
Data Protection
We use industry-leading cloud infrastructure with enterprise-grade security measures.
- 1
All data is encrypted at rest using AES-256 encryption.
- 2
All data in transit is protected with TLS 1.2+ encryption.
- 3
Regular automated backups with encryption.
- 4
Comprehensive logging and monitoring systems.
