How We Protect Your Documents
Security is at the core of everything we do
Encryption Everywhere
In Transit
All data transferred between your device and our servers is encrypted using TLS 1.3, the latest and most secure transport protocol.
At Rest
Your documents are encrypted using AES-256 encryption when stored on our servers. This is the same standard used by banks and government agencies.
Zero-Knowledge Architecture
Our team does not have access to read your documents. The AI processing happens automatically, and human employees never see your document contents. Your privacy is protected by design, not just by policy.
Infrastructure Security
- Cloud hosting — We use enterprise-grade cloud infrastructure with SOC 2 Type II certification
- Regular backups — Your data is backed up regularly to prevent loss
- DDoS protection — Our systems are protected against distributed denial-of-service attacks
- Intrusion detection — We monitor for suspicious activity 24/7
Access Controls
- Row-level security — Database policies ensure you can only access your own documents
- Role-based permissions — Team access is controlled by configurable permission levels
- Audit logging — All access to your documents is logged and can be reviewed
Your Responsibilities
Security is a shared responsibility. Here's how you can help:
- Keep your email account secure (it's used for sign-in)
- Review team member access regularly
- Log out of shared devices
- Report suspicious activity immediately