Security & privacy

Built to earn trust.

We take dealer data seriously. We operate with strong security standards and are happy to walk through controls, architecture, and customer requirements during evaluation.

Core principles
  • Least-privilege access and role-based permissions.
  • Encrypt data in transit; use modern, hardened infrastructure patterns.
  • Limit access to authorized personnel; keep an audit trail for operational visibility.
  • Data minimization: collect what we need, not what we can.
  • Secure-by-default integrations and credential handling.
  • Clear customer communication when security requirements come up.
What we can support
  • Security questionnaires and IT reviews during procurement.
  • Scoped access (separate environments, least-privilege tokens, connector-by-connector enablement).
  • Data retention expectations and deletion requests by customer policy.
  • Restricted sharing: your data is used to operate your account—never to train public models.
  • Incident response coordination if an event ever occurs.
  • Documentation for integration pathways and data flows.
Questions?

If security is on the line for your evaluation, we’ll happily jump on a call with your IT team and walk through our approach.

Note: We’ll never claim certifications we don’t have. We’ll share what we do have.