top of page

Security and Data Practices

Built with data responsibility in mind.

​

Our platform is designed for organizations operating in compliance-sensitive environments. We prioritize controlled workflows, clear data handling boundaries, and operational transparency.

​

We focus on helping customers execute structured outreach while maintaining visibility and control over how their data is used.

Data, Access, and Security

Data Handling

We process lead contact data only as needed to execute customer-configured workflows

  • Data is used solely to perform authorized outreach workflows

  • We do not sell or share lead data with third parties

  • Customers control what data is uploaded and processed

  • Data access is limited to authorized system functions and personnel

Access Controls

Access to platform systems and configuration tools is restricted to reduce risk.

  • Access is limited based on operational needs

  • Authentication protections are used where applicable

  • Configuration control remains with the customer

Security Practices

We follow generally accepted security practices appropriate for a SaaS platform.

  • Data transmission protections (such as encryption in transit where applicable)

  • Use of established infrastructure providers

  • Monitoring for system reliability and integrity

Customer Responsibility

Customers are responsible for configuring workflows and outreach rules in accordance with applicable laws and internal policies.

​

Our platform provides tools that support compliant configurations Final usage decisions remain with the customer.

Security Questions

For security-related inquiries, contact:​

security@voxaflow.net​

bottom of page