Security

Enterprise-Grade Security

Your data is yours. We protect it with the same infrastructure trusted by the world's largest enterprises.

Data Ownership

Your Data. Your Rules.

We believe your data belongs to you — full stop. You retain complete ownership and control at every stage.

You own your data — always

Your business data, client records, and agent configurations belong entirely to you. We are custodians, not owners.

Never shared with third parties

Your data is never sold, shared, or made accessible to any third party. It exists solely to serve your operation.

Full export & deletion

Export all of your data at any time in standard formats. Request complete deletion and we will honour it promptly.

Data residency in your chosen region

Choose where your data is stored. We support regional hosting to meet your compliance and sovereignty requirements.

Authentication & Access

Controlled Access at Every Level

Every interaction with the platform is authenticated, authorised, and logged. No shortcuts.

Multi-factor authentication

All accounts support MFA, adding a critical second layer of verification beyond passwords.

Role-based access control

Granular permissions for admins, clients, and team members ensure people only see what they need to.

Session management with auto-expiry

Inactive sessions are automatically terminated. Active session management prevents unauthorised access from stale tokens.

Encrypted credential storage

Passwords are hashed using industry-standard algorithms. No plaintext credentials are ever stored or transmitted.

Infrastructure

Enterprise-Grade from the Ground Up

Our infrastructure is built on the same foundations trusted by global enterprises and financial institutions.

Enterprise-grade cloud hosting

Hosted on world-class cloud infrastructure with high availability, redundancy, and continuous monitoring.

AES-256 encryption at rest

All stored data is encrypted using AES-256, the same standard used by governments and financial institutions worldwide.

TLS 1.3 encryption in transit

Every data transmission is secured with TLS 1.3, ensuring your information is protected between every endpoint.

Automated backups & recovery

Continuous automated backups with point-in-time recovery. Your data is resilient against hardware failure and human error.

SOC 2 compliant hosting

Our hosting infrastructure meets SOC 2 compliance standards for security, availability, and confidentiality.

AI & Data Processing

Responsible AI, By Design

Your data powers your agents — and nothing else. We enforce strict boundaries around how AI interacts with your information.

No training on your data

AI conversations and client data are never used to train, fine-tune, or improve any external models. Your data stays yours.

Isolated processing environments

Client data is processed in logically isolated environments. There is no cross-contamination between accounts.

Encrypted conversation data

All conversation and interaction data is encrypted and access-controlled with strict audit trails.

You control agent data access

Define exactly what data each AI agent can see and act on. Fine-grained controls ensure agents only access what you permit.

Compliance

Built for Regulatory Confidence

We take compliance seriously. Our practices are designed to meet the requirements of key privacy and security frameworks.

Australian Privacy Act 1988

Our data handling practices are compliant with the Australian Privacy Act 1988 and the Australian Privacy Principles (APPs).

GDPR-aware data handling

We apply GDPR-informed practices including data minimisation, right to erasure, and transparent processing disclosures.

Regular security audits

We conduct regular internal and third-party security audits to identify and address vulnerabilities proactively.

Incident response procedures

Documented incident response protocols ensure rapid detection, containment, and transparent communication if an issue occurs.

Have enterprise security requirements?

We are happy to walk through our security practices in detail, answer compliance questionnaires, or discuss custom requirements for your organisation.

Contact Us