Security
Your data security is our top priority
We understand that your support conversations contain sensitive customer data. That's why we've built Quality Agent with enterprise-grade security from the ground up.
-
-
All data is encrypted in transit using TLS 1.3 and at rest using bank-grade encryption. Your support conversations and customer data are always protected.
-
-
Hosted on Digital Ocean’s secure cloud. We use industry-leading infrastructure with 99.9% uptime SLA and automatic backups.
-
-
Granular permissions system ensures team members only see what they need. Separate roles for owners, managers, and agents with customizable access levels.
Our Security Commitment
While we're a growing startup, we take security seriously from day one. We follow industry best practices and are continuously improving our security posture.
What We Do Today
- Encrypt all data in transit and at rest
- Regular security updates and patches
- Secure cloud infrastructure on Digital Ocean
- Daily automated backups
On Our Roadmap
- SOC 2 Type II compliance (in progress)
- Third-party security audits
- Penetration testing
- Additional compliance certifications
Security Practices
Data Handling
We follow the principle of least privilege and data minimization. We only collect and process the minimum data necessary to provide our service. Your support conversation data is:
- • Never sold or shared with third parties
- • Only accessed by authorized personnel when necessary for support
- • Automatically deleted according to your retention policies
- • Fully exportable and deletable at any time
AI Processing & Privacy
Our AI scoring and training features are designed with privacy in mind:
- • AI models do not train on your data
- • Conversations are processed transiently and not stored by AI providers
- • Option to use on-premises deployment for sensitive data
- • All AI processing follows our strict data handling policies
Authentication & Access
We implement multiple layers of authentication and access control:
- • Two-factor authentication (2FA) available for all accounts
- • Single Sign-On (SSO) via SAML for Enterprise customers
- • Session management with automatic timeout
- • IP allowlisting available for additional security
Monitoring & Incident Response
We maintain comprehensive security monitoring and incident response procedures:
- • 24/7 security monitoring and alerting
- • Automated threat detection and response
- • Regular security updates and patching
- • Incident response team with defined escalation procedures
Vulnerability Disclosure
We take security vulnerabilities seriously and appreciate responsible disclosure. If you discover a potential security issue, please report it to us immediately.
We will acknowledge your report within 24 hours and work with you to understand and resolve the issue promptly. We request that you do not publicly disclose the issue until we have addressed it.
Questions about security?
If you have any questions about our security practices or need specific security documentation for your procurement process, we're here to help.