Security

Security controls built for enterprise contact centres

Multi-tenant isolation, role-based access, auditability and secure storage.

Access control and tenancy

Access is scoped by organisation and role. Product access can be restricted.

Org-based multi-tenancy

All data is scoped by organisation ID. Queries enforce org_id filtering at the data layer so one organisation cannot access another's data.

Role-based access

Three access levels: master, manager, and agent. Each role sees only the data and actions relevant to their responsibilities.

Product-level access control

Users can be restricted to specific products within the organisation, limiting visibility to only the campaigns they manage.

Session management

Authentication uses HttpOnly cookies with silent refresh tokens. Sessions are scoped and expire automatically.

Data protection

Security is designed to support regulated operating environments.

Encryption in transit

All data transmitted between client and server is encrypted via TLS.

Encryption at rest

Stored data including transcripts, analysis outputs, and call metadata is encrypted at rest.

Secure storage

Transcripts and analysis outputs are stored in managed infrastructure with access controls and backup policies.

Auditability and incident readiness

Manager actions can be logged so follow-through is visible.

Audit logs

Manager actions, report generation, coaching sends, and reviews are logged with timestamps and user attribution.

Webhook verification

Incoming webhooks are verified using HMAC signatures to prevent spoofing and ensure data integrity.

Incident response

A defined incident response process covers detection, containment, notification, and post-incident review.

See also: Trust overview, Privacy, and Data Hosting.

Want to see how Vootery flags compliance misses and deal killers in under a minute?

Bring a call sample, your scripts or non-negotiables, and your current QA process.

Book a Demo