Trust Center
Straight Lines is committed to protecting customer data and maintaining secure operations. This page provides a high-level overview of our security, privacy, and compliance posture.
Security contact: security@str8lines.com
Support contact: ai-support@str8lines.com
Security Overview
Hosting and Infrastructure
Straight Lines is hosted on a major and reliable cloud provider and is designed using a segmented network architecture that restricts access between system components.
Encryption
- Encryption in transit: Data is protected using TLS for communications between users and our service.
- Encryption at rest: Customer data stored within our systems is encrypted at rest using industry-standard mechanisms.
Access Control
- Access follows least privilege principles.
- Administrative access is restricted to authorized personnel and protected using strong authentication controls.
Monitoring and Logging
We use centralized monitoring and logging to support service reliability, security event detection, and incident response.
Data Protection
Customer content is stored in private cloud storage. Access to protected content is controlled through authenticated access mechanisms.
AI Model Governance
Customers with administrative permissions can configure:
- which AI workflows are available to their organization, and
- which AI model provider(s) are enabled per workflow.
When third-party AI model providers are enabled, customer inputs may be processed by those providers to deliver the selected workflow.
Compliance
- SOC 2: Straight Lines is not currently SOC 2 certified. We plan to begin a SOC 2 Type II program next month.
- Penetration testing: Straight Lines undergoes annual independent third-party penetration testing. The most recent test was completed recently. An executive summary may be provided under NDA upon request.
Subprocessors
We can provide this list under NDA upon request.
Vulnerability Reporting
To report a potential security vulnerability, please email security@str8lines.com. We will acknowledge reports and coordinate remediation as appropriate.
Additional Documentation
Detailed security documentation (e.g., architecture and data flow diagrams, questionnaire responses, and penetration test summary) is available under NDA upon request.