Skip to content

Built for pipeline, not vanity sends

Real inboxes. Clear replies. Built to get meetings booked.

Start freeNo credit card required

Security & trust

A concise overview for security and IT reviewers. This page is not a substitute for your Data Processing Agreement (DPA), completed questionnaires, or legal review.

Data handling principles

  • Customer content (messages, training material, and configuration) is processed to deliver the service you configure in your workspace.
  • Operational logging is minimized to what is needed for reliability, abuse prevention, and support, with access restricted by role.
  • Retention and deletion practices follow the product’s admin controls and applicable agreements; exact windows are documented in your order form or DPA.

Security posture (high level)

Acquirely is designed for B2B deployment: authenticated access, encrypted transport in transit (TLS), and infrastructure providers selected for operational maturity. Subprocessors and certifications are listed in vendor documentation shared during procurement.

[Placeholder] Insert finalized statements on encryption at rest, SSO, audit logs, pen tests, and incident response after legal and engineering sign-off.

Data Processing Agreement (DPA)

For GDPR and similar obligations, B2B customers typically require a DPA. Contact us for a DPA and include your legal entity, expected volume, and regions involved.

Email: security@acquirely.io (update to your real security inbox before launch).