Security & Compliance
Enterprise‑grade controls with respectful, compliant outreach by design.
Data Handling
- Data minimization and purpose limitation
- Role‑based access and audit logs
- Encryption in transit and at rest
Compliance
- GDPR/CCPA alignment and DPAs on request
- Opt‑out, suppression lists, and quiet hours
- Consent‑respecting messaging patterns
Safety & Guardrails
- Rate limiting and warm‑up protections
- Message policies and profanity filters
- Human approval on sensitive changes
Ownership
- Your data remains your property
- Export on request and clear deletion paths
- Transparent subprocessors
Vendor Management
We maintain a vetted list of subprocessors and review their controls regularly. We’ll sign DPAs and BAAs where appropriate.
Incident Response
Monitored channels, runbooks, and customer notifications aligned with regulatory timelines.