Security & Privacy
How Verow protects your agency's data and your clients' confidential information.
Agencies trust Verow with sensitive client information: RFP details, campaign strategies, budget numbers, competitive insights. We take that responsibility seriously.
This page explains how we protect your data and maintain the confidentiality your clients expect.
Your Data Stays Yours
Let's address the most common concern about AI-powered tools upfront.
We never train AI models on your data. Your client information, conversation histories, and uploaded files are not used to improve our AI or anyone else's. Period.
You own everything you put into Verow. We're a tool to help you manage client relationships, not a way to extract value from your data.
Export anytime. Download your complete data history whenever you want. See Exporting Your Data for instructions.
Delete anytime. Request deletion of your data and we'll permanently remove it from our systems.
Data Protection
Encryption
All data is encrypted both in transit and at rest.
- In transit: TLS 1.3 encryption protects data moving between your browser and our servers
- At rest: AES-256 encryption protects data stored in our databases and file storage
This is the same level of encryption used by major financial institutions.
Infrastructure Security
Verow runs on enterprise-grade cloud infrastructure with:
- 24/7 monitoring for unusual activity
- Automatic security patches and updates
- Regular penetration testing by third-party security firms
- Distributed backups across multiple geographic regions
SOC 2 Certification
We are actively pursuing SOC 2 Type II certification. Our security controls are designed to meet SOC 2 standards covering:
- Security
- Availability
- Confidentiality
Contact our team if you have specific compliance questions or need documentation for your vendor review process.
Client Data Isolation
Each client workspace in Verow is logically isolated from others. This means:
- No cross-contamination. One client's data never leaks into another client's workspace
- Separate AI context. Each client agent only has access to information from that specific client
- Granular permissions. Control which team members can access which client workspaces
Even within your agency, you can restrict access so team members only see the clients they work with.
Team Access Controls
Verow gives you fine-grained control over who can access what.
Role-Based Permissions
Assign team members different roles based on their responsibilities:
- Owner: Full control over the team account including billing and settings
- Admin: Manage the team and its resources without billing access
- Member: Use all agents, add and view context
Workspace-Level Access
Beyond roles, you can control access at the workspace level:
- Assign specific team members to specific clients
- Restrict sensitive clients to senior team members only
- Give temporary access to contractors or freelancers
See Team Management for detailed setup instructions.
Integration Security
When you connect third-party tools like Google Calendar or Slack:
- OAuth authentication. We use industry-standard OAuth flows, never storing your passwords
- Minimal permissions. We request only the access needed for the integration to function
- Revocable access. Disconnect any integration at any time from your settings
- Encrypted tokens. Connection credentials are encrypted in our database
Review connected integrations anytime in Settings > Integrations.
Privacy Practices
What We Collect
We collect only what's necessary to provide the service:
- Account information (email, name)
- Content you create in Verow (client data, notes, files)
- Usage data to improve the product (anonymized and aggregated)
What We Don't Do
- Sell your data to third parties
- Share client information with other Verow customers
- Use your data for advertising
- Train AI models on your content
Data Location
Your data is stored in secure data centers in the United States. If your agency has specific data residency requirements, contact our team to discuss options.
Security Questions
If you have security requirements beyond what's covered here, we're happy to discuss them.
For security documentation: Contact our team for our security whitepaper or to complete your vendor security questionnaire.
To report a security concern: Email security@verow.io. We take all reports seriously and will respond within 24 hours.
For enterprise security needs: Larger agencies may need custom security configurations. Reach out to discuss enterprise options.