RightFlow Security
RightFlow handles highly sensitive employment data. Our security model prioritizes encryption, isolation, and traceability across the full document workflow.
Security model
The product is designed to keep trust signals readable: protected storage, tenant-scoped access, and traceability when something needs to be reviewed.
Data handling
Encrypted at rest and in transit
Isolation
Tenant-scoped backend checks
Response
Expedited security review path
Encryption and storage
Documents are encrypted in transit and at rest. Storage access is restricted by environment, service account, and tenant-scoped controls.
Access control
Authenticated access is enforced for workspace actions, and tenant isolation is verified on the backend before documents or reports are returned.
Monitoring and auditability
Requests carry correlation identifiers so operational and security events can be traced across frontend, backend, and document-processing services.
Security contact
If you believe you have discovered a security issue, contact security@right-flow.com. We review security reports on an expedited basis.