Back to Home

Security

At Answrr, security is fundamental to everything we build. We understand that you're trusting us with your business communications, and we take that responsibility seriously.

Enterprise-Grade Security

SOC 2 compliant infrastructure with industry-leading security practices.

End-to-End Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256).

Secure Infrastructure

Hosted on world-class cloud providers with 99.9% uptime SLA.

Privacy by Design

GDPR, CCPA, and PIPEDA compliant data handling practices.

Data Encryption

Encryption in Transit

  • All connections use TLS 1.3 with strong cipher suites
  • HSTS (HTTP Strict Transport Security) enforced
  • Certificate pinning for mobile applications
  • Perfect Forward Secrecy (PFS) enabled

Encryption at Rest

  • AES-256 encryption for all stored data
  • Database encryption with customer-isolated keys
  • Call recordings encrypted with unique per-recording keys
  • Secure key management using hardware security modules (HSMs)

Infrastructure Security

Cloud Security

  • Hosted on SOC 2 Type II certified cloud infrastructure
  • Multi-region deployment for redundancy and disaster recovery
  • Network isolation with private subnets and VPCs
  • DDoS protection and Web Application Firewall (WAF)
  • Regular vulnerability scanning and penetration testing

Access Controls

  • Role-based access control (RBAC) for all systems
  • Multi-factor authentication required for all employees
  • Principle of least privilege enforced
  • Just-in-time access for production systems
  • Comprehensive audit logging of all access

Monitoring & Detection

  • 24/7 security monitoring and alerting
  • Intrusion detection systems (IDS)
  • Security Information and Event Management (SIEM)
  • Automated threat detection and response
  • Regular security assessments and audits

Application Security

Secure Development

  • Secure Software Development Lifecycle (SSDLC)
  • Code reviews required for all changes
  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Dependency scanning for known vulnerabilities
  • Regular third-party security audits

Authentication & Authorization

  • Secure password hashing with bcrypt
  • Two-factor authentication (2FA) available
  • Session management with secure tokens
  • API authentication via secure tokens
  • OAuth 2.0 for third-party integrations

AI & Voice Security

Voice Data Protection

  • Real-time voice processing with no persistent storage of raw audio streams
  • Call recordings stored encrypted with access controls
  • Transcripts processed securely with data minimization
  • Voice data isolated per customer account

AI Model Security

  • AI models run in isolated, secure environments
  • Customer data not used to train shared models
  • Prompt injection protection measures
  • Regular AI security assessments

Compliance & Certifications

SOC 2 Type II

Annual audits for security, availability, and confidentiality.

GDPR

Full compliance with EU data protection regulations.

CCPA

California Consumer Privacy Act compliance.

PIPEDA

Canadian privacy law compliance.

Telecommunications Compliance

  • TCPA (Telephone Consumer Protection Act) compliant features
  • CRTC regulations compliance for Canadian operations
  • Call recording consent management tools
  • Do Not Call list integration capabilities

Organizational Security

Employee Security

  • Background checks for all employees
  • Security awareness training program
  • Confidentiality agreements
  • Clean desk and clear screen policies
  • Secure remote work policies

Vendor Management

  • Security assessments for all vendors
  • Data processing agreements in place
  • Regular vendor security reviews
  • Vendor access monitoring and controls

Incident Response

Our Commitment

  • Documented incident response procedures
  • 24/7 security incident response team
  • Regular incident response drills
  • Breach notification within 72 hours as required by law
  • Post-incident analysis and remediation

Business Continuity

  • Disaster recovery plans tested annually
  • Multi-region data replication
  • Automated failover capabilities
  • Regular backup testing and verification

Your Security Controls

We provide you with tools to enhance your account security:

  • Two-Factor Authentication: Add an extra layer of security to your account
  • API Key Management: Generate, rotate, and revoke API keys
  • Session Management: View and terminate active sessions
  • Audit Logs: Track account activity and changes
  • Data Export: Export your data at any time
  • Data Deletion: Request complete data deletion

Security Questions or Concerns?

We're committed to transparency about our security practices. If you have questions, need security documentation, or want to report a vulnerability, please contact us.

Security Team: security@answrr.ai

Vulnerability Disclosure: security@answrr.ai

Security Documentation Requests: Contact your account manager or email security@answrr.ai

Responsible Disclosure

We appreciate the security research community's efforts in helping keep Answrr secure. If you discover a security vulnerability, please report it to security@answrr.ai. We ask that you:

  • Provide sufficient detail to reproduce the vulnerability
  • Allow reasonable time for us to address the issue before public disclosure
  • Avoid accessing or modifying other users' data
  • Act in good faith to avoid privacy violations and service disruption

Last Updated: January 30th, 2026