Security
Security built for regulated work.
We provide a short security overview covering privacy and protection principles. Due diligence documentation is available to qualified customers on request.
Data handling approach
- Evidence is managed within each organization’s scope with controlled access.
- Files are verified before being used within the platform.
- Reports are prepared from approved excerpts, not full evidence.
Core security controls
- Clear access rules and controlled permissions.
- Full organizational isolation to prevent cross-organization exposure.
- Periodic internal reviews to ensure these controls remain enforced.
Saudi deployment options
- Supports in-Saudi deployment options based on organizational requirements.
- Core workflows can run within your environment when needed.
- Residency requirements are documented per engagement during due diligence.
Assurance and disclosures
- We provide accurate, up-to-date statements on available safeguards.
- Statements are reviewed prior to release.
- Entity and detailed control documentation is shared during due diligence on request.