Security & Compliance

Trust cues and posture language aligned to enterprise expectations.

Back

Enterprise posture

  • SOC 2-ready controls: audit logs, access control, retention policies
  • GDPR principles: minimization, transparency, retention/deletion controls
  • HIPAA-aware workflows: safeguard-aligned documentation where needed

Data use policy

Policy
Isolation

No training on customer data — customer data stays isolated and is not used for training.

This page is a UX starter: it's meant to be replaced with your canonical security documentation and questionnaire answers.