← Home
Platform Solutions Pricing Partners Resources Company FAQ Book a Demo
TRUST · SECURITY

Data Security Overview

Version 1.0 Effective April 6, 2026 Inquiries · security@fohboh.ai

This document describes the administrative, technical, and physical safeguards FohBoh.ai applies to protect Customer business data (e.g., POS, financial, operational data) and account information. These controls apply to all FohBoh platform components: MGE™, Sentry™, and Cortex™. FohBoh operates as a read-only platform wherever possible and does not modify source system data. We are not a system of record.

01Scope & Purpose

This document describes the administrative, technical, and physical safeguards FohBoh.ai applies to protect Customer business data (e.g., POS, financial, operational data) and account information. These controls apply to all FohBoh platform components: MGE™, Sentry™, and Cortex™.

FohBoh operates as a read-only platform wherever possible and does not modify source system data. We are not a system of record.

02Data Classification

We classify all Customer data as Confidential and apply the highest level of protection, including encryption, access controls, and audit logging.

03Encryption

StateStandard
At restAES-256 encryption for all databases, backups, and file storage.
In transitTLS 1.2+ (TLS 1.3 preferred) for all data transmitted between Customer systems and FohBoh, as well as internal service communication.
BackupsEncrypted at rest with AES-256; stored in a separate logical environment.

04Access Controls

05Network Security

06Audit Logging & Monitoring

The following events are logged, retained for at least 12 months, and monitored for anomalies:

Logs are immutable (write-once) and sent to a centralized security information and event management (SIEM) system. Alerts are triggered for suspicious patterns (e.g., unusual data exports, repeated failed logins).

07Vendor & Subprocessor Security

All subprocessors (cloud providers, AI model providers, etc.) are contractually required to maintain security standards at least as stringent as those described here. FohBoh conducts periodic reviews of each subprocessor's SOC 2, ISO 27001, or equivalent attestation.

A current list of subprocessors is available at fohboh.ai/subprocessors or upon request to security@fohboh.ai.

08Incident Response

FohBoh maintains a written Incident Response Plan that includes:

72-hour notification. In the event of a data breach involving Customer business data, FohBoh will notify affected Customers within 72 hours of confirmation and will provide reasonable information to assist Customer in meeting legal notification obligations.

09Business Continuity & Disaster Recovery

MetricTarget
Recovery Time Objective (RTO)4 hours
Recovery Point Objective (RPO)15 minutes

10Employee Security Training

11Vulnerability Management & Penetration Testing

12Customer Responsibilities

While FohBoh secures the platform, Customers are responsible for:

13Compliance & Certifications

FohBoh currently maintains the following security framework:

For Customers who require GDPR or CCPA compliance, FohBoh will sign a Data Processing Addendum (DPA) — request at privacy@fohboh.ai.

14Reporting a Security Concern

If you discover a potential vulnerability or security incident involving FohBoh:

We follow a coordinated disclosure process and will not take legal action against good-faith security researchers who comply with our responsible disclosure guidelines (available at fohboh.ai/responsible-disclosure).

Security Inquiries

security@fohboh.ai

Privacy & DPA

privacy@fohboh.ai

15Version & Updates

This Security Overview is reviewed at least annually and updated as controls evolve. Material changes will be communicated via email or platform notice.

Current Version: 1.0 — April 6, 2026