Security & trust

Placeholder content — document encryption, access controls, incident response, and subprocessors before launch.

Data handling

Describe regions, backups, and who can access production data.

OAuth tokens

Stored encrypted; invalidated on revocation.

How deletion requests work Start free scan