Trust Center

Security

A factual overview of the product security posture, operational safeguards, and the documentation path for deeper buyer review.

Last updated

April 15, 2026

Security principles

  • +Least-privilege access and role-based product permissions
  • +Layered protection for account, session, and operational data
  • +Logging, monitoring, and incident-response readiness as part of platform operations
  • +Ongoing secure-development and remediation work aligned to a documented roadmap

Product and data handling

Payments rely on third-party payment infrastructure designed for secure transaction handling. Got Your Team? is building a clearly scoped payment-compliance posture around those integrations.

Operational data is protected through application-level controls, infrastructure controls, and environment-specific access restrictions.

Current roadmap posture

Formal assurance work such as SOC 2 Type II and expanded procurement artifacts is part of the broader trust roadmap, but those items should be discussed as roadmap commitments rather than current certifications unless formally completed.

Buyer documentation path

For deeper reviews, contact us for the current security overview, roadmap posture, and the latest buyer-facing trust materials available for your procurement process.

Need help?

Security questions

Include the page, the account or organization involved, and the action you were trying to complete so we can route the request quickly.

Contact Got Your Team?