Trust Center
Built for calls that become business records.
handles conversations, transcripts, customer context, SMS, and follow-up. That means trust is not a badge on a page. It is access control, consent, audit evidence, and operational visibility built into the system.
SOC 2 readiness is an operating system.
We are building toward SOC 2 with the pieces that matter first: controlled access, logged changes, incident visibility, housekeeping evidence, and vendor-aware data handling.
View system statusAccess control
Role-based workspace access, Clerk-backed authentication, least-privilege admin actions, and audit records for operational changes.
Audit evidence
Config changes, call lifecycle events, consent updates, integration writebacks, and ops runbooks are captured as durable records.
Consent controls
Recording, transcription, cookie, and communication consent are treated as first-class operating controls instead of loose policy text.
Reliability checks
Internal housekeeping tracks stuck calls, failed jobs, sync drift, and retry queues so issues are visible before they become support mysteries.
Security
- Authentication and workspace-aware authorization
- Operational actions gated by role
- Sentry and Axiom telemetry for diagnostics
- Audit trails for admin and system changes
Privacy & Compliance
- Consent records for website preferences
- Configurable call recording and transcription controls
- HIPAA add-on path for covered workflows
- Data retention policy model in the product schema
Reliability
- Inngest-backed background jobs
- Ops runbooks for safe repair actions
- Housekeeping pass/fail evidence
- Public status foundation for customer-facing updates
