Security & Trust

Security & Trust Center

How We Protect Your Data

At Cognlay, security isn't an afterthought—it's built into every layer of our system. Here's exactly how we keep your outbound campaigns, lead data, and email credentials safe.

Last Updated: February 16, 2026

Enterprise-Grade Encryption

In transit: TLS 1.3. At rest: AES-256 for stored data (lead lists, drafts, conversation history, credentials). OAuth tokens are encrypted and we never see your password.

Secure OAuth Authentication

Google authentication happens directly with Google. Cognlay receives a secure access token (not your password). Tokens are encrypted and you can revoke access instantly.

Minimal Data Access

We request only the Gmail API permissions needed for outbound automation and reply tracking. We do not request Drive, Calendar, or permission to delete emails.

SOC 2-Level Security Practices

RBAC, audit logging, MFA for production access, quarterly reviews, and dependency scanning. We are working toward formal SOC 2 Type II certification as we scale.

Isolated Data Architecture

Logical isolation per customer. AI processing happens in isolated contexts. Rate limiting and monthly caps help prevent abuse and protect sender reputation.

Transparent Incident Response

Automated monitoring for anomalies. If we confirm a breach, we notify affected users within 72 hours with details and remediation steps.

Gmail API scopes we use

We only request the permissions we actually need.

gmail.send

Send emails on your behalf

gmail.readonly

Read emails to detect replies and maintain thread context

gmail.modify

Update labels for reply tracking

We do not request access to your entire Google account, permission to delete emails, or access to Drive, Calendar, or other services.

Common security questions

Security roadmap

We're actively working on:

SOC 2 Type II certification (target: Q3 2026)

Annual penetration testing by third-party security firms

Bug bounty program for responsible disclosure

SAML/SSO support for enterprise customers

Report a security issue

Found a vulnerability? Please report it responsibly.

Email: developer@cognlay.com

Response time: Within 24 hours for critical issues

We do not currently offer a bug bounty, but we publicly credit security researchers who report valid issues (with permission).

Questions?

Security concerns? Email support@cognlay.com or developer@cognlay.com. We respond to all security inquiries within 24 hours.