Skip to content
SECURITY

Compliance-first, by default.

SOC 2 Type II. HIPAA-ready. GDPR-aligned. Every call recorded, every consent honored, every action audit-trailed.

How your data is protected.

  • SOC 2 Type II
    Annual audit, continuous monitoring. Report available under NDA.
  • HIPAA with BAA
    PHI encrypted at rest and in transit. BAA available for covered entities.
  • TCPA compliance
    Consent tracking, DNC list honoring, and per-state dial rules.
  • AWS, 4 regions
    Isolated tenants, encrypted storage, multi-region failover.
  • Role-based access
    SSO, SCIM, and granular permissions out of the box.
  • Recording + audit log
    Every call, every message, every agent action — logged and queryable.

Vulnerability reporting

Report a vulnerability to [email protected]. We respond within 24 hours and disclose resolved issues in our security bulletin.

Sub-processors

Our current sub-processor list is available on request. We notify customers 30 days in advance of any material changes.

Your security team will love the paperwork.

Book a demo. See your first agent live inside a week.