Security at SignalOps

We treat operational data the way you treat the floor.

Carefully, deliberately, and with a paper trail. Here is the brand-promise level overview. For a detailed security architecture document, including data residency, encryption posture, and operational trail mechanics, request our security architecture under NDA.

What we promise

Five commitments we hold to, every day.

These are promises about how we operate. The technical mechanics behind each one are documented and reviewed, then shared under NDA with prospective customers who need to verify.

We encrypt data at rest and in transitOperational records and receipt images are protected on the wire and in storage.
We keep a record of the sensitive stuffTransaction edits and voids, month locks, PIN resets, and district changes are written to an operational trail.
We run on enterprise-grade infrastructureOperational data is hosted on managed infrastructure in U.S. data centers.
We follow least-privilege access for our own teamNo engineer reads dealer data without an active support ticket. Access is scoped, time-bounded, and reviewed.
We retain data only as long as you need itDeletion is final. Account deletion removes operational records on a documented schedule.

Detailed architecture

Want the deep version? Request it under NDA.

Detailed material covers data residency, encryption posture, the shape of our operational trail, vendor list, and infrastructure architecture. It is delivered to prospective customers under a mutual non-disclosure agreement.

Vulnerability reporting

security@signalops.app

Response window

72-hour acknowledgement

Include the route, environment, reproduction steps, and anything that helps us verify safely. We will confirm receipt within 72 hours.