Privacy & Data Protection

Governance, not surveillance.

VERYTIS is built with a clear principle: audit decisions and actions without violating user privacy.

Privacy by Design

We audit metadata, not content. VERYTIS never reads, parses, or analyzes the content of your messages or emails.

What we audit

  • Decisions
  • Actions
  • Metadata and explicit signals

What we never audit

  • Message content
  • Private conversations
  • Files or attachments
  • Documents or PDFs

Collaboration Tools

Slack, Microsoft Teams

  • Textual messages in authorized channels only
  • Thread context and timestamps
  • Explicit decision or action signals
Strict Exclusions
Private messages (DMs)Files & AttachmentsImages, PDFs, Docs

Email

VERYTIS never accesses email content.

  • Sender and recipients
  • Timestamps
  • Open status & Reply status

Email bodies are technically inaccessible to our systems.

What We Will Never Do

Read message content
Access private messages
Capture files or attachments
Monitor employee behavior
Perform keystroke logging
Record screens or windows
Use data for AI training

We audit decisions and actions — not people.

Data Governance & Lifecycle

Retention

Retained during active subscription. Deletion occurs after a 30-day grace period post-termination.

Deletion

Applies to production & backups. We do not retain customer data beyond contractual requirements.

Ownership

Customers retain full ownership. VERYTIS acts solely as a data processor. No resale.

Security & Infrastructure

Data Residency

Hosted in West US (Oregon). Single region for controlled locality.

Encryption

AES-256 encryption at rest and in transit. Enforced by default.

Access Control

Operates within explicitly granted permissions. Revocable at any time.

Infrastructure

Hosted on AWS via Supabase-managed services. Proven cloud infrastructure.

Privacy Summary

Metadata only — no content Email metadata only Hosted in West US (Oregon) AES-256 encryption Explicit permissions

Governance-first, surveillance-free.