At Rexpt, security is foundational to how we build and operate our Voice AI platform. We understand that you're trusting us with your business communications, and we take that responsibility seriously.
This page provides an overview of the security measures we implement to protect your data.
Your data is encrypted both in transit and at rest.
| Protection | Standard |
|---|---|
| Data in Transit | TLS 1.3 encryption for all connections |
| Data at Rest | AES-256 encryption for stored data |
| Call Recordings | Encrypted storage with access controls |
| Backups | Encrypted with separate key management |
We host our platform on industry-leading cloud providers with robust security certifications.
We implement strong authentication controls to protect your account.
We implement multiple layers of protection for your data.
| Measure | Description |
|---|---|
| Access Controls | Role-based permissions with least-privilege principle |
| Audit Logging | All access and changes are logged |
| Data Isolation | Customer data is logically separated |
| Secure Development | Security reviews and testing in our development process |
| Fraud Prevention | Automated detection of suspicious activity |
We retain your data only as long as necessary and provide clear deletion timelines.
| Data Type | Retention Period |
|---|---|
| Call Recordings | 90 days, then automatically deleted |
| Call Transcripts | 90 days, then automatically deleted |
| Account Data | Duration of subscription + 30 days |
| After Account Deletion | All data deleted within 7 days |
You can request early deletion of your data at any time by contacting support.
We design our platform with privacy regulations in mind.
Contact us for compliance documentation: legal@rxpt.us
We design for high availability to keep your AI agents running.
We appreciate the work of security researchers in helping us keep Rexpt secure.
Reporting a Vulnerability
If you discover a security vulnerability in our platform, please report it to us responsibly:
What to Include
Our Commitment
For security-related inquiries or to report a vulnerability:
We aim to respond to all security inquiries within 48 hours.
Scope
The following are in scope for security research:
Out of Scope
Please do not: