Enterprise-Grade Security

Your clients' data is sacred.
We built CallIntel to prove it.

Insurance agencies handle some of the most sensitive personal information in any industry. CallIntel was architected from day one with a single mandate: process the data your agency needs, sync it to your AMS, and purge everything we don't need to keep.

AES-256
Encryption Standard
GCM mode with unique IVs
< 5 min
PII Retention
Purged after every AMS sync
30-day
Hard Data Cap
Automated retention enforcement
100%
Audit Coverage
Every action logged

Security Principles

These aren't just features we added. They're architectural decisions baked into every line of code.

Core Principle
Data Minimization

We only hold data long enough to sync it to your AMS. Phone numbers are masked, transcriptions deleted, and SMS bodies wiped immediately after successful sync — typically within 1 hour. A 30-day automated cleanup serves as an absolute safety net, not the primary retention window.

Defense in Depth
Encryption Everywhere

AES-256-GCM for credentials at rest with random initialization vectors. TLS for all data in transit. HSTS enforced with 2-year preload. Database encrypted at rest via Neon. Zero plaintext secrets.

SOC 2 Ready
Complete Audit Trail

Every mutation, data access, and administrative action is automatically logged with timestamp, user identity, and organization context. Audit logs are immutable and available for compliance review.

Least Privilege
Layered Access Control

Role-based permissions (Owner, Admin, Agent, Viewer) ensure team members only access what they need. Admin routes require elevated privilege. All sessions managed by enterprise-grade Clerk authentication with MFA support.

What We Never Store

Some data should never touch a third-party server. Period.

Call recordings or audio files

Recordings stay with your VoIP provider

Credit card or payment information

Handled entirely by Stripe (PCI DSS Level 1)

AMS client databases or policy data

Contact lookups are real-time, never cached

Browser cookies for tracking or ads

Essential auth cookies only

Phone numbers after AMS sync

Automatically masked to ***-***-XXXX

Transcription text after AMS sync

Permanently deleted, not archived

Data Flow & Lifecycle

Every piece of data has a defined path through CallIntel and a defined exit. Here's exactly what happens.

VoIP Webhook Received

0 sec

Call event arrives from Dialpad/RingCentral/Vonage. Verified via HMAC signature. Rate limited to 200 req/min per organization.

Contact Matched & Call Logged

1-3 sec

AMS queried in real-time (credentials decrypted only at query time). Call metadata stored temporarily for sync processing.

Synced to Your AMS

3-5 min

Call details, AI summary, and transcription written as an activity note in your AMS. Your AMS becomes the permanent system of record.

PII Automatically Purged

Immediate

Phone numbers masked. Transcription text deleted. SMS bodies wiped. Contact names cleared. Only anonymized metrics remain for your dashboard.

Data Retention Schedule

Every data type has an explicit retention policy. No ambiguity.

Call recordingsNever stored
AMS client recordsNever stored
Credit card dataNever stored
Screen pop dataAuto-deleted in 5 min
Phone numbersMasked after AMS sync
Transcription text & summariesDeleted after AMS sync
SMS message bodiesDeleted after AMS sync
Contact namesCleared after AMS sync
All remaining PII30-day hard maximum
Encrypted credentialsUntil you revoke
Anonymized analyticsRetained for dashboard
Audit logsRetained for compliance

Security Controls

A complete inventory of every security control implemented in CallIntel. Suitable for vendor management questionnaires and security reviews.

Encryption
  • AES-256-GCM for credentials at rest
  • TLS 1.3 for all data in transit
  • HSTS with 2-year max-age and preload
  • Database encryption at rest (Neon)
  • Unique initialization vectors per encryption
Network Security
  • Rate limiting: 200 req/min per org (webhooks)
  • Rate limiting: 100 req/min per user (API)
  • Webhook HMAC signature verification
  • X-Frame-Options: DENY (clickjacking prevention)
  • Strict Referrer-Policy and Permissions-Policy
  • No-store Cache-Control on all API responses
Access Control
  • Clerk enterprise authentication
  • Multi-factor authentication support
  • Role-based access (Owner/Admin/Agent/Viewer)
  • Admin route separation with elevated checks
  • Invitation-only team onboarding
  • Automatic session expiration
Data Protection
  • Automatic PII purge after AMS sync
  • 30-day hard retention limit for all PII
  • Phone number masking (***-***-XXXX)
  • Transcription and SMS body deletion
  • No PII in application logs
  • Cascading deletion on account termination
Monitoring & Response
  • Automatic audit logging of all mutations
  • Sensitive query access logging
  • 72-hour breach notification commitment
  • Hourly automated data hygiene cron
  • Webhook event logging (IDs only, no PII)

Role-Based Access Control

Principle of least privilege. Every user gets exactly the access they need and nothing more.

Permission Matrix
OwnerFull organization management, billing, credentials, team
AdminTeam management, settings, complete call log access
AgentOwn call history, screen pops, leaderboard
ViewerRead-only dashboard and analytics
Authentication Features
  • Enterprise authentication via Clerk (SOC 2 Type 2)
  • Multi-factor authentication support
  • Google OAuth / social sign-in
  • Automatic session timeout and rotation
  • Admin routes require separate privilege check
  • Invitation-only team member onboarding
  • Account lockout after failed attempts
  • Secure password hashing (handled by Clerk)

Certified Infrastructure

Every layer of our stack is backed by audited, certified providers. You don't have to take our word for it.

Vercel

Application Hosting & Edge Network

SOC 2 Type 2ISO 27001
DDoS protection
Global CDN
Automatic scaling
Edge runtime

Neon

Serverless PostgreSQL Database

SOC 2 Type 2
Encryption at rest
SSL enforced
Automated backups
Point-in-time recovery

Clerk

Authentication & Identity

SOC 2 Type 2
MFA support
Session management
OAuth providers
Brute force protection

Stripe

Payment Processing

PCI DSS Level 1
We never see card data
Tokenized billing
Fraud detection
3D Secure

Incident Response

We take a proactive approach to security incidents. Our response framework ensures rapid detection, containment, and transparent communication.

  • 72-hour breach notification to all affected customers
  • Notification includes scope, data involved, and remediation steps
  • Immediate credential rotation and access revocation capability
  • Cascading database deletion ensures no orphaned data
  • Post-incident review and public disclosure

Responsible Disclosure

We welcome security researchers and industry peers who want to help us improve. If you discover a vulnerability, we want to hear about it.

Report a Vulnerability

Email us at security@callintel.app with details of the issue. We commit to:

  • Acknowledgment within 24 hours
  • Assessment and status update within 72 hours
  • No legal action against good-faith researchers

Going through vendor management?

We built CallIntel to pass your security review, not just survive it.

We're happy to provide documentation, walk through our architecture, answer questionnaires, or schedule a call with your compliance team. Our security posture is something we're proud of.