Your data security is our top priority
At Sales Automation, we understand that your email data is sensitive and confidential. We've built our platform with security as a foundational principle, implementing multiple layers of protection to ensure your information remains safe and private.
All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest and most secure encryption protocol. This ensures that your information cannot be intercepted during transmission.
Sensitive data stored in our database is encrypted using industry-standard AES-256 encryption. This includes:
We only extract and store the contact information you need—names, titles, companies, email addresses, phone numbers, and related metadata. We do NOT store:
Email processing happens in secure, isolated worker processes. Emails are processed in batches and immediately discarded after extraction. The system uses a queue-based architecture that ensures data is never stored longer than necessary.
All user accounts are protected with two-factor authentication (2FA) using time-based one-time passwords (TOTP). This adds an extra layer of security beyond passwords.
Our platform implements comprehensive role-based access control, ensuring that users can only access data they're authorized to see. Team members have different permission levels based on their roles:
All database queries are scoped by user and organization ID, ensuring complete tenant isolation. Your data is never accessible to other users or organizations, even at the database level.
We use industry-standard OAuth 2.0 for connecting to email providers (Gmail, Outlook) and CRM systems (HubSpot). This means:
All security-relevant events are logged in our audit system, including authentication attempts, data access, configuration changes, and API usage. These logs help us monitor for suspicious activity and maintain compliance.
We implement data retention policies to ensure that sensitive information is not stored longer than necessary. Context summaries and temporary artifacts are automatically purged according to our retention schedule.
Our infrastructure is designed with security best practices:
Our team is here to answer any security-related questions you may have