Security Policy

This page describes our security approach at a high level and is not a contractual guarantee. Review with counsel for your needs.

Role-based access

Access aligns to multi-unit roles and is intended to support least-privilege visibility.

Auditability

Key actions (assignments, coaching, verification) are designed to be attributable and reviewable.

Incident response

We investigate security issues promptly and communicate material incidents per applicable agreements.