SECURITY

Built with security-first fundamentals.

Your data is protected with modern authentication, least-privilege access, encrypted storage, and secure infrastructure — so you can confidently manage properties, tenants, and owners.

Role-based access

Landlord, manager, staff permissions.

Private file storage

Reports & documents stored securely.

Audit-ready

Track actions with an activity trail (Business).

Core protections

The baseline controls every serious property platform should have.

Authentication & access control

  • Secure login with session-based auth
  • Role-based permissions (landlord, manager, staff)
  • Least-privilege access by default

Data encryption

  • Encrypted in transit (HTTPS/TLS)
  • Encrypted at rest (database + storage)
  • Signed URLs for private files when needed

Secure infrastructure

  • Hosted on modern cloud infrastructure
  • Managed database with backups
  • Auditable change history (Business plan)

How we protect owner reports

Your monthly owner income PDFs are generated securely and shared safely.

Private by default

Reports are stored in private storage and only accessible via short-lived signed links.

  • • Private storage bucket for reports
  • • Signed URLs expire automatically
  • • Access tied to authenticated user

Audit-ready workflow

Business teams can track actions like report generation, edits, and key events.

  • • Audit log for key actions (Business)
  • • Clear record of who did what
  • • Helps build trust with owners

Operational security

Best practices that keep day-to-day operations safe.

Permissions

  • Access based on role + property scope
  • Limit staff to what they need
  • Separate owner vs tenant views

Monitoring & logging

  • Server logs for troubleshooting
  • Audit trails for business accounts
  • Actionable alerts for failures

Data minimization

  • Collect only what’s needed
  • Optional phone + optional unit count
  • Clear separation of sensitive data

Do you sell or share customer data?

No. Your data stays in your system. We only use it to provide the service.

Can staff see everything?

No — access is role-based. Staff permissions can be restricted by feature and scope.

Are documents and reports public?

No — they’re stored privately. Secure signed links are used when a file must be accessed.

What happens if someone forgets their password?

Account recovery follows secure auth flows. Password reset links are time-limited.

Want a security walkthrough?

We’ll show you how roles, reports, and audit logs work end-to-end.