Security
Stub · replace with counsel-approved copy before launch
This page is a placeholder. Summarize how you protect customer and participant data: encryption in transit and at rest, access controls, incident response, and where infrastructure runs.
Enterprise buyers often expect a separate security whitepaper or questionnaire; this route can point to contact for those materials.