Legal

Security at Foyla.

Last updated: April 2026

This page describes how we protect customer data and AI deployments. Procurement and security teams can request our SOC 2 report, penetration test summary, and full subprocessor list at [email protected].

How we think about it

An AI employee has access to real systems and takes real actions. We design for the same assumption a security team would apply to a human operator: least privilege, complete audit, human review on anything new, and a fast path to contain a problem.

Infrastructure

Data protection

Access control

The AI employee itself

Vulnerability management

Business continuity

Security roadmap

We're an early-stage company and say so plainly. The following controls are on our near-term roadmap rather than already certified. We'll update this page as they ship.

If any of these are a gating requirement for you, let us know — we can often commit to a timeline contractually.

Compliance

US state privacy laws (CCPA/CPRA, Colorado, Connecticut, Virginia, Utah) and GDPR/UK GDPR are addressed in our Privacy Policy and DPA. SOC 2 and ISO are on the roadmap above.

Contact

Security questions and vulnerability reports: [email protected]