Security is at the core of everything we do
- SOC 2 Type 2 Compliance
- Our security controls are audited by a third-party to ensure that they meet the highest standards.
- Penetration testing
- We use an external security firm to perform regular penetration tests to ensure that our systems are secure.
- Data encryption
- We encrypt all data in transit and at rest using industry-standard encryption algorithms.
- AI safety
- You are in control of your data. It will never be used to train an AI model, and you can delete it at any time.
