Legal
Security
Last updated May 20, 2026
Sales calls and playbooks are sensitive material. We treat the data you trust us with as if it were our own. This page summarizes the controls behind the Quddify platform. For the full picture, see our Privacy Policy.
Data isolation
Your playbooks, calls, and roleplays are scoped to your account. We never use one customer’s content to train or improve outputs for another customer. Tenant data is logically isolated in our application and database layers.
Encryption
Data in transit is protected with TLS 1.2 or higher. Data at rest, including call recordings and transcripts, is encrypted using AES-256. Encryption keys are managed by our cloud provider’s key management service with restricted access.
Access controls
Administrative access to production systems requires multi-factor authentication and is limited to the smallest group needed to operate the platform. We follow least-privilege principles, review access regularly, and revoke it promptly when no longer needed.
Application security
We run automated static and dynamic analysis on every change to the platform, scan dependencies for known vulnerabilities, and require code review before merging. Critical findings are prioritized and remediated under defined SLAs.
Infrastructure
The platform runs on reputable cloud providers in SOC 2 attested data centers. We segment networks, restrict ingress with firewalls, and continuously monitor production for anomalous activity.
Incident response
We have a documented incident response plan covering detection, containment, investigation, recovery, and post-incident review. If a confirmed security incident affects your data, we will notify you without undue delay and, where required by law, within 72 hours.
Backups and resilience
Production data is backed up on a regular cadence and tested for restoreability. Our platform is built to recover from common cloud-provider failures without data loss.
Vendor management
We assess the security posture of subprocessors before granting them access to customer data and review them on an ongoing basis. A list of subprocessors is available on request.
Responsible disclosure
If you believe you’ve found a security issue in our product or website, please report it to us through LinkedIn. We acknowledge reports within two business days and will work with you on remediation. Please give us a reasonable window before public disclosure.
Compliance roadmap
Quddify is pre-launch and our compliance program is actively maturing. We are working toward SOC 2 Type II attestation and we design our controls to meet GDPR, UK GDPR, and U.S. state privacy law expectations.