Memraiq
Security and trust by design
Security controls are built into the hosted platform — not bolted on afterward. Access is explicit, data handling is documented, and we use disciplined internal logging for safety and reliability.
Authentication
JWT + bcrypt
Data at rest
Fernet encrypted
Transport
HTTPS/TLS only
Access model
Role-based (RBAC)
Access and identity
—JWT access tokens with 15-minute expiry
—httpOnly refresh tokens, 30-day TTL
—Separate admin auth scope (platform-level)
—Organisation-level role boundaries
—Owner, admin, and member roles
—Email invite flow for member onboarding
—Session invalidation on password change
—Magic link support for passwordless login
Data handling and encryption
—Passwords hashed with bcrypt (never stored plaintext)
—LLM API keys encrypted with Fernet before storage
—Document content stored in Supabase (PostgreSQL + S3)
—Vectors stored in Qdrant Cloud (encrypted at rest)
—Graph data stored in Neo4j Aura (encrypted at rest)
—All traffic encrypted in transit (HTTPS/TLS)
—Conversation history scoped to organisation
—No cross-tenant data access at any layer
Logging and internal operations
We log activity to run the hosted service safely — not to sell analytics. Technical metadata may include model, provider, and token counts where needed for billing enforcement, abuse prevention, and support; that is an internal and contractual practice, not a customer-facing cost or health dashboard product.
—Structured logs for security events, debugging, and incident response
—Internal monitoring of dependencies to keep the service reliable
—Ingestion and indexing records for troubleshooting and customer support
—Retention aligned with billing reconciliation and legal obligations (see Privacy Policy)
—Platform operators use diagnostics; in-product surfaces focus on your workspace (e.g. uploads, answers)
—No cross-tenant log access for customer users
Incident readiness
—Diagnostics-first design for dependency failures
—Internal operational monitoring of service and dependency health
—Explicit error codes (not silent failures)
—Structured logging for audit and debugging
—Enterprise customers notified within 72h of breach
—Data deletion on org/account termination
Sub-processor transparency
Document content is processed by third-party LLM providers for indexing and chat. Here is the full list of services that handle your data:
Supabase
Database, file storage, authentication
Qdrant Cloud
Vector storage for semantic search
Neo4j Aura
Knowledge graph storage
Anthropic
LLM inference (Claude models)
OpenAI
Embeddings and LLM inference
Resend
Transactional email delivery
Paystack
Payment processing
Full DPA available at /legal/dpa. Enterprise customers may request a security questionnaire response.
Questions about security, compliance, or data handling? Contact us or review our Data Processing Addendum.