SECURITY
Built with security-first fundamentals.
Your data is protected with modern authentication, least-privilege access, encrypted storage, and secure infrastructure — so you can confidently manage properties, tenants, and owners.
Role-based access
Landlord, manager, staff permissions.
Private file storage
Reports & documents stored securely.
Audit-ready
Track actions with an activity trail (Business).
Core protections
The baseline controls every serious property platform should have.
Authentication & access control
- • Secure login with session-based auth
- • Role-based permissions (landlord, manager, staff)
- • Least-privilege access by default
Data encryption
- • Encrypted in transit (HTTPS/TLS)
- • Encrypted at rest (database + storage)
- • Signed URLs for private files when needed
Secure infrastructure
- • Hosted on modern cloud infrastructure
- • Managed database with backups
- • Auditable change history (Business plan)
How we protect owner reports
Your monthly owner income PDFs are generated securely and shared safely.
Private by default
Reports are stored in private storage and only accessible via short-lived signed links.
- • Private storage bucket for reports
- • Signed URLs expire automatically
- • Access tied to authenticated user
Audit-ready workflow
Business teams can track actions like report generation, edits, and key events.
- • Audit log for key actions (Business)
- • Clear record of who did what
- • Helps build trust with owners
Operational security
Best practices that keep day-to-day operations safe.
Permissions
- • Access based on role + property scope
- • Limit staff to what they need
- • Separate owner vs tenant views
Monitoring & logging
- • Server logs for troubleshooting
- • Audit trails for business accounts
- • Actionable alerts for failures
Data minimization
- • Collect only what’s needed
- • Optional phone + optional unit count
- • Clear separation of sensitive data
Do you sell or share customer data?
No. Your data stays in your system. We only use it to provide the service.
Can staff see everything?
No — access is role-based. Staff permissions can be restricted by feature and scope.
Are documents and reports public?
No — they’re stored privately. Secure signed links are used when a file must be accessed.
What happens if someone forgets their password?
Account recovery follows secure auth flows. Password reset links are time-limited.
Want a security walkthrough?
We’ll show you how roles, reports, and audit logs work end-to-end.
