Enterprise-grade security built for law enforcement aviation. Your operational data is protected by multiple layers of defense, encrypted at every stage, and stored exclusively in the United States.
PostgreSQL with Row-Level Security (RLS) enforces complete tenant isolation at the database level. Each agency's data is cryptographically separated β even application-level bugs cannot leak data across organizations.
All data is encrypted at rest and in transit using industry-standard protocols. Backups are compressed and encrypted before upload to secure storage.
Enterprise-grade authentication powered by Clerk with multi-factor authentication, secure session management, and SSO readiness.
Role-Based Access Control (RBAC) limits data access based on user roles within your organization. Administrative actions are gated by permission level.
Built on enterprise-grade infrastructure providers that maintain SOC 2 Type II certification and rigorous security programs.
All data is stored and processed exclusively within the United States. No data is transferred outside US borders.
Automated nightly database backups with multiple recovery options ensure your data is always protected against loss.
Documented incident response procedures with 72-hour breach notification commitment to affected agencies.
We partner with industry-leading infrastructure providers, each maintaining rigorous security certifications. All sub-processors are contractually obligated to protect your data.
| Provider | Purpose | Location | Certification |
|---|---|---|---|
| Neon | PostgreSQL database hosting | United States (US-East) | SOC 2 |
| Vercel | Application hosting and CDN | United States | SOC 2 Type II |
| Clerk | Authentication and identity | United States | SOC 2 Type II |
| AWS S3 | Encrypted backup storage | United States (US-East) | SOC 2, ISO 27001 |
| Resend | Transactional email delivery | United States | β |
| Anthropic | AI features (when enabled) | United States | SOC 2 Type II |
We're happy to answer security questionnaires, provide documentation, or discuss our security posture with your IT or compliance team.
Contact Security Team