Security & Compliance

Enterprise‑grade controls with respectful, compliant outreach by design.

Data Handling

  • Data minimization and purpose limitation
  • Role‑based access and audit logs
  • Encryption in transit and at rest

Compliance

  • GDPR/CCPA alignment and DPAs on request
  • Opt‑out, suppression lists, and quiet hours
  • Consent‑respecting messaging patterns

Safety & Guardrails

  • Rate limiting and warm‑up protections
  • Message policies and profanity filters
  • Human approval on sensitive changes

Ownership

  • Your data remains your property
  • Export on request and clear deletion paths
  • Transparent subprocessors

Vendor Management

We maintain a vetted list of subprocessors and review their controls regularly. We’ll sign DPAs and BAAs where appropriate.

Incident Response

Monitored channels, runbooks, and customer notifications aligned with regulatory timelines.