Your clients' data is sacred.
We built CallIntel to prove it.
Insurance agencies handle some of the most sensitive personal information in any industry. CallIntel was architected from day one with a single mandate: process the data your agency needs, sync it to your AMS, and purge everything we don't need to keep.
Security Principles
These aren't just features we added. They're architectural decisions baked into every line of code.
We only hold data long enough to sync it to your AMS. Phone numbers are masked, transcriptions deleted, and SMS bodies wiped immediately after successful sync — typically within 1 hour. A 30-day automated cleanup serves as an absolute safety net, not the primary retention window.
AES-256-GCM for credentials at rest with random initialization vectors. TLS for all data in transit. HSTS enforced with 2-year preload. Database encrypted at rest via Neon. Zero plaintext secrets.
Every mutation, data access, and administrative action is automatically logged with timestamp, user identity, and organization context. Audit logs are immutable and available for compliance review.
Role-based permissions (Owner, Admin, Agent, Viewer) ensure team members only access what they need. Admin routes require elevated privilege. All sessions managed by enterprise-grade Clerk authentication with MFA support.
What We Never Store
Some data should never touch a third-party server. Period.
Call recordings or audio files
Recordings stay with your VoIP provider
Credit card or payment information
Handled entirely by Stripe (PCI DSS Level 1)
AMS client databases or policy data
Contact lookups are real-time, never cached
Browser cookies for tracking or ads
Essential auth cookies only
Phone numbers after AMS sync
Automatically masked to ***-***-XXXX
Transcription text after AMS sync
Permanently deleted, not archived
Data Flow & Lifecycle
Every piece of data has a defined path through CallIntel and a defined exit. Here's exactly what happens.
VoIP Webhook Received
0 secCall event arrives from Dialpad/RingCentral/Vonage. Verified via HMAC signature. Rate limited to 200 req/min per organization.
Contact Matched & Call Logged
1-3 secAMS queried in real-time (credentials decrypted only at query time). Call metadata stored temporarily for sync processing.
Synced to Your AMS
3-5 minCall details, AI summary, and transcription written as an activity note in your AMS. Your AMS becomes the permanent system of record.
PII Automatically Purged
ImmediatePhone numbers masked. Transcription text deleted. SMS bodies wiped. Contact names cleared. Only anonymized metrics remain for your dashboard.
Data Retention Schedule
Every data type has an explicit retention policy. No ambiguity.
Security Controls
A complete inventory of every security control implemented in CallIntel. Suitable for vendor management questionnaires and security reviews.
- AES-256-GCM for credentials at rest
- TLS 1.3 for all data in transit
- HSTS with 2-year max-age and preload
- Database encryption at rest (Neon)
- Unique initialization vectors per encryption
- Rate limiting: 200 req/min per org (webhooks)
- Rate limiting: 100 req/min per user (API)
- Webhook HMAC signature verification
- X-Frame-Options: DENY (clickjacking prevention)
- Strict Referrer-Policy and Permissions-Policy
- No-store Cache-Control on all API responses
- Clerk enterprise authentication
- Multi-factor authentication support
- Role-based access (Owner/Admin/Agent/Viewer)
- Admin route separation with elevated checks
- Invitation-only team onboarding
- Automatic session expiration
- Automatic PII purge after AMS sync
- 30-day hard retention limit for all PII
- Phone number masking (***-***-XXXX)
- Transcription and SMS body deletion
- No PII in application logs
- Cascading deletion on account termination
- Automatic audit logging of all mutations
- Sensitive query access logging
- 72-hour breach notification commitment
- Hourly automated data hygiene cron
- Webhook event logging (IDs only, no PII)
Role-Based Access Control
Principle of least privilege. Every user gets exactly the access they need and nothing more.
- Enterprise authentication via Clerk (SOC 2 Type 2)
- Multi-factor authentication support
- Google OAuth / social sign-in
- Automatic session timeout and rotation
- Admin routes require separate privilege check
- Invitation-only team member onboarding
- Account lockout after failed attempts
- Secure password hashing (handled by Clerk)
Certified Infrastructure
Every layer of our stack is backed by audited, certified providers. You don't have to take our word for it.
Vercel
Application Hosting & Edge Network
Neon
Serverless PostgreSQL Database
Clerk
Authentication & Identity
Stripe
Payment Processing
Incident Response
We take a proactive approach to security incidents. Our response framework ensures rapid detection, containment, and transparent communication.
- 72-hour breach notification to all affected customers
- Notification includes scope, data involved, and remediation steps
- Immediate credential rotation and access revocation capability
- Cascading database deletion ensures no orphaned data
- Post-incident review and public disclosure
Responsible Disclosure
We welcome security researchers and industry peers who want to help us improve. If you discover a vulnerability, we want to hear about it.
Report a Vulnerability
Email us at security@callintel.app with details of the issue. We commit to:
- Acknowledgment within 24 hours
- Assessment and status update within 72 hours
- No legal action against good-faith researchers