Skip to main content

Security and privacy

Controls

  • Workspace access controls and role-based permissions
  • Audit logs for escalations and policy changes
  • Data retention policies per workspace