SECURITY
Compliance-first, by default.
SOC 2 Type II. HIPAA-ready. GDPR-aligned. Every call recorded, every consent honored, every action audit-trailed.
How your data is protected.
- SOC 2 Type IIAnnual audit, continuous monitoring. Report available under NDA.
- HIPAA with BAAPHI encrypted at rest and in transit. BAA available for covered entities.
- TCPA complianceConsent tracking, DNC list honoring, and per-state dial rules.
- AWS, 4 regionsIsolated tenants, encrypted storage, multi-region failover.
- Role-based accessSSO, SCIM, and granular permissions out of the box.
- Recording + audit logEvery call, every message, every agent action — logged and queryable.
Vulnerability reporting
Report a vulnerability to [email protected]. We respond within 24 hours and disclose resolved issues in our security bulletin.
Sub-processors
Our current sub-processor list is available on request. We notify customers 30 days in advance of any material changes.