Security and data handling

Built for teams that care about reliability, privacy, and control.

This page explains how projects are designed for GDPR-aware data handling, role-based access, auditability, and safe AI operations. For legal details, see our privacy policy and legal notice.

Data minimization first

We only collect and process the data needed for delivery, support, and security. Optional fields stay optional.

Access by role

Access is limited to the smallest scope needed for the task, with account-level controls and environment separation.

Auditability built in

Key workflows are tracked with logs and event history so teams can review what changed, by whom, and when.

AI with guardrails

Automation includes review steps, clear boundaries, and fallback paths so AI can support decisions without taking blind actions.

Control areas we design into delivery.

These controls are tailored to your stack, data sensitivity, and operating model.

Data location and transfers

Primary systems are configured for EU handling where supported. If a provider uses non-EU subprocessors, we document the transfer basis and scope.

  • EU-region setup where available
  • Transfer safeguards for third-country processing
  • Subprocessor visibility and policy links

Application and infrastructure security

Production systems use HTTPS, controlled credentials, and environment-level separation to reduce accidental exposure.

  • HTTPS in transit and managed platform controls
  • Secrets managed per environment
  • Rate limiting and abuse protection on public endpoints

Permissions and accountability

Workflows are designed with role boundaries and activity traces so teams can verify approvals and state changes.

  • Role-aware access patterns
  • Action trails for operational events
  • Documented ownership for each critical flow

AI safety and review model

AI-enabled features are scoped to bounded tasks with human review for sensitive outcomes and business-critical actions.

  • Human review checkpoints
  • Prompt and output boundaries
  • Fallback routes when confidence is low

Need the legal details too?

This page is an operational summary. Legal disclosure pages remain the source of record for processing details and regulatory rights.