Security

Security and data in the open

B2B buyers should not have to guess how vendor AI touches customer or employee data. This page states how we think about the basics; specifics tighten in contract and architecture for your engagement.

Topics we cover with every serious engagement

Access and secrets

Least-privilege credentials, rotation, and separation between environments. Agents receive only the scopes their workflow truly needs.

Data handling

We align on what can be logged, how long it is kept, and where prompts or retrieved text may be stored. Defaults are conservative unless you specify otherwise.

Regions and residency

When your policy demands specific regions or private networking, we factor that into hosting and API design up front.

Suppliers and subprocessors

Model providers, hosters, and observability tools are named explicitly in proposals so procurement and security can review in one pass.

Deeper diligence welcome

We support questionnaires, calls with your security team, and architecture reviews proportionate to the sensitivity of the workload.

Start the conversation

Share your constraints and we will reflect them in a proposal you can share internally without translation.

Prefer email first? info@sdsclick.io