Your data. Your rules. Our obsession.

Handling privileged billing data requires controls that put you in charge. From encryption to data deletion, every feature is designed for security teams.

shield

Document Retention Controls

Your Choice, Your Timeline

Wipe documents after review or retain them. Set retention policies per invoice, per matter, or organization-wide. You decide when data disappears.

Keep Intelligence, Delete Originals

Preserve structured data (amounts, flags, metadata) for analytics while permanently deleting original PDF invoices.

Bulk Purge Operations

Delete all documents older than any date you specify. Maintain clean compliance with your document retention policies.

Transparent Status & Audit Trail

Visual indicators show retention status. Every deletion event is logged. Full visibility into what data has been removed.

Retention Policy

Automatic Deletion

90 days after review

Manual Retention

Keep for dispute resolution

Scheduled Purge

Delete all pre-2024 documents

Recent Actions

Deleted 847 PDFs on Mar 15, 2026

Deleted 612 PDFs on Feb 28, 2026

Infrastructure Security

vpn_lock

Encryption

AES-256 encryption at rest. TLS 1.3 for all data in transit. Industry-standard protocols with no exceptions.

person_lock

Access Control

Role-based permissions. SSO/SAML for Enterprise accounts. Fine-grained controls over who sees what.

history

Audit Logging

Every action logged. Uploads, reviews, exports, deletions. Full activity history for compliance and investigation.

dataset

Data Isolation

Multi-tenant architecture with PostgreSQL row-level security. Your data is siloed from other customers.

AI & Data Commitment

We will never train AI models on your data.

Our AI processes your invoices only to generate results for you. No data retention beyond the processing session. No sharing with third parties for model improvement.

Third-Party AI Providers

All external AI vendors are bound by confidentiality agreements. Data is processed in isolation for your use case only.

Transparency & Control

You control whether AI features are enabled. Audit logs show which data was processed and when. Full visibility, no surprises.

Compliance Roadmap

check_circle Available

DPA Available

Download our Data Processing Agreement. Ready to sign with your organization.

schedule Coming Soon

SOC 2 Type II

Planned within 12 months of launch. Security and availability certifications on the roadmap.

schedule Enterprise

Data Residency

US, EU, and Canada region options for Enterprise customers. Keep your data where you need it.

Ready to see our security in detail?

Download our DPA or get in touch. We're ready to answer every question about how we protect your data.