Trust
Corporate buyers often need basic trust and security context before a first call. This page provides a high-level overview. If you need more detail for procurement, we can share it on request.
Security at a glance
- Access control and role separation are designed into the systems.
- Changes and key actions are captured through audit-friendly logging.
- Backups and recovery are treated as operational requirements, not optional extras.
- Data handling follows the principles described in our Privacy Notice.
Data processing
Details such as data residency, subprocessors, and a Data Processing Agreement (DPA) are available on request, depending on the delivery model (SaaS, on-premise, or pilot).
Responsible disclosure
If you believe you have found a security issue, please report it through our contact channel. We will respond and coordinate next steps.
Report a security issue: Contact us →
Company and privacy
- Imprint (legal details): Imprint
- Privacy Notice: Privacy Notice
Procurement requests
If your procurement team needs specific documents (DPA, subprocessor list, security overview), send a short request and we will respond within 1 business day (often within 24 hours).