Security

Built with your data security as a priority.

Clarity ingests customer feedback from your connected sources to generate synthesized recommendations for your team. Here is how we protect your data at every step.

How we handle your data

Read-only access.
Integrations only request read-only permissions. Clarity never writes to or modifies your source systems.
Data isolation.
Every customer's data is fully isolated using row-level security at the database level. Your data is never accessible to other customers.
No AI training.
Your data is never used to train, fine-tune, or improve any AI models. It is only processed to generate results for your team.
US-hosted infrastructure.
All data is stored and processed in the United States on secure cloud infrastructure.

Encryption

At rest.
All stored data is encrypted using AES-256.
In transit.
All data in transit is encrypted via TLS 1.2+.

Authentication and access

Integration authentication.
All third-party integrations authenticate via OAuth 2.0. Clarity never stores raw passwords or credentials.
Access scopes.
Integrations request read-only permissions only. Clarity does not request write access to any connected system.
User authentication.
Application access is managed through secure, session-based authentication with token management.

Certifications

Clarity is built on certified infrastructure and follows SOC 2 and ISO 27001 frameworks in our own practices. Clarity's own certification process is underway. In the meantime, we welcome detailed security reviews and can provide architecture walkthroughs on request.

What we can provide on request

For security questions or to request documentation, contact security@withclarity.dev