Your calls are some of the most sensitive artifacts in your business — every name, number, objection, and unguarded moment is in there. Here's exactly how we protect them.
Security is not a feature list — it's a set of commitments you can check against behavior. These four are the ones we'd want to see from a vendor handling our own sales calls.
You own it, you control it, you can export or delete it in a click. We don't sell it, we don't train AI on it, we don't share it with anyone we haven't disclosed.
AES-256 at rest across every database and backup. TLS 1.3 in transit across every hop. Secrets in a managed vault with per-environment rotation.
Engineers don't have standing access to customer data. Production access is just-in-time, approved, logged, and time-boxed. MFA is required everywhere.
If something breaks, you'll hear about it from us within 72 hours of confirmed impact — not from a news article. No spin, no lawyer-talk.
The specific technical and organizational measures we have in place. Customers on Enterprise can request detailed evidence for each row as part of a vendor review.
Every vendor has incidents eventually. What matters is the clock that starts ticking the moment one is confirmed. Here's ours.
Automated monitoring or a report triggers an alert. On-call engineer acknowledges within 15 minutes, 24/7.
Immediate isolation of affected systems. Incident commander assigned. Customer-impacting status posted to status.oneclickcoaching.com.
Forensic analysis of blast radius: which customers, which data, what was exposed vs. read vs. exfiltrated.
Affected customer admins notified directly by email & phone, with specifics. Regulatory notifications triggered where required.
Written post-mortem shared with affected customers: root cause, timeline, what we changed. No spin.
Security researchers: thank you. We welcome reports and we don't sue the people who help us. Here's how to reach us and what you can expect.
Encrypt sensitive details with our PGP key (fingerprint 4A3D · 8B2F · 9E1C · 7D4A · 5F6B · E2C8 · 1A9D · 3F4E · 8C7B · 2D5A).
If you act in good faith and abide by the rules below, we commit not to pursue or support any legal action against you.
These documents are available on request to Enterprise customers evaluating us, usually in an afternoon rather than a quarter.