Back to home
Trust & data

Privacy at a glance

This overview helps teams evaluate how customer data fits into deployment models. Your legal agreement with your vendor supersedes this page.

Your stack
Data residency
TLS + RBAC
Access model
Per policy
Retention
Rolling
Last updated

What we process

  • Workspace configuration, user accounts, roles, and audit metadata needed to operate the product.
  • CRM and project records you create inside the tenant (deals, contacts, tasks, files, and reports).
  • Technical logs required for security, reliability, and support — scoped and retained per deployment policy.

Tenancy & isolation

  • Data is scoped to tenants so organizations stay logically separated in multi-tenant setups.
  • Control-plane patterns can apply when you operate a SaaS-style environment on your infrastructure.

Your choices

  • Export and reporting capabilities depend on your plan and deployment; enterprise engagements can define stricter retention.
  • Contact your account owner or deployment administrator for access, correction, or deletion requests.