Security & Trust

Your data security is our top priority. We implement enterprise-grade security measures to protect your business information.

Encryption

All data encrypted at rest and in transit using industry-standard protocols

Multi-Tenant Isolation

Row-Level Security ensures complete data separation between companies

Enterprise Infrastructure

Built on Supabase, an enterprise-grade platform trusted by thousands

Row-Level Security (RLS)

Database-level security policies ensure complete data isolation. Your data is physically separated from other customers at the database level.

  • Every query automatically filters by companyId
  • Policies enforced at the PostgreSQL level
  • Zero-trust architecture from database to UI
  • Type-safe Prisma queries prevent data leaks
-- PostgreSQL RLS Policy Example
CREATE POLICY company_isolation
 ON appointments
 FOR ALL
 USING (
 company_id = current_setting(
 'app.current_company_id'
 )::uuid
 );

Encryption Standards

Data at Rest

AES-256 encryption for all stored data. Database backups encrypted with industry-standard algorithms.

Data in Transit

TLS 1.3 for all connections. End-to-end encryption for sensitive operations. Certificate pinning for mobile applications.

Key Management

Encryption keys managed by Supabase infrastructure. Keys rotated regularly and stored in secure key management systems.

Encryption

All data is encrypted using industry-standard protocols. Your information is protected both at rest and in transit.

Infrastructure & Compliance

Infrastructure

  • Supabase enterprise-grade PostgreSQL hosting
  • 99.9% uptime SLA
  • Automated backups with point-in-time recovery
  • Geographic redundancy and disaster recovery

Security Practices

  • Regular security audits and penetration testing
  • Vulnerability scanning and patch management
  • Security incident response procedures
  • Employee security training and access controls

Access Controls

Multi-factor authentication, role-based access control, and comprehensive audit logging ensure only authorized users can access your data.

Authentication & Authorization

Multi-Factor Authentication

Optional MFA for additional account security. Support for TOTP authenticator apps.

Role-Based Access Control

Granular permissions system. Control who can view, edit, or delete specific data within your organization.

Session Management

Secure session tokens with automatic expiration. Device fingerprinting for suspicious activity detection.

Audit Logging

Complete audit trail of all data access and modifications. Track who did what and when for compliance and security.

Incident Response

We take security incidents seriously and have procedures in place to respond quickly and transparently.

Detection & Response

Automated monitoring and alerting systems detect potential security issues. Our team responds immediately to investigate and remediate any threats.

Notification

In the event of a security incident affecting your data, we will notify affected customers within 72 hours as required by applicable laws.

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly to:

[email protected]

Your Data is Safe

We've built security into every layer of our platform. Your business data is protected by enterprise-grade security measures.

99.9%
Uptime SLA
AES-256
Encryption
24/7
Monitoring