Security at Verc
Security is at the core of everything we build. As a platform that processes sensitive call data and conversations, protecting our customers' information is our highest priority.
Last updated: February 2026
Governance
Our policies are based on the following foundational principles:
Access should be limited to only those with a legitimate business need and granted based on the principle of least privilege.
Security controls should be implemented and layered according to the principle of defense-in-depth.
Security controls should be applied consistently across all areas of the platform and organization.
The implementation of controls should be iterative, continuously maturing across the dimensions of improved effectiveness and increased auditability.
We are building our security program toward industry-recognized certifications. The following frameworks are on our compliance roadmap:
We run on Google Cloud Platform with enterprise-grade infrastructure, physical security, and network isolation.
Verc implements database-level row-level security (RLS) to enforce strict tenant isolation. Every database query is automatically scoped to the authenticated tenant's organization. This means customer data is isolated at the database layer, not just the application layer, providing defense-in-depth against data leakage.
Our middleware pipeline sets the tenant context on every request, and PostgreSQL RLS policies enforce isolation regardless of application logic. This architectural approach ensures that even in the event of an application-level vulnerability, cross-tenant data access is prevented by the database itself.
We employ multiple layers of security testing throughout our development lifecycle:
Vendor security assessments are reviewed annually or when significant changes occur in the vendor relationship.
As an AI-powered call analytics platform, we take special care to ensure responsible and secure processing of sensitive conversation data.
At Verc, data privacy is a fundamental commitment. We build privacy controls into our platform by design and maintain transparency with our customers about how their data is handled.
We only collect and process data that is necessary for providing our services. Customer data is retained only for the duration required by the service agreement, and deletion mechanisms are available to customers.
Verc's security program is designed to meet requirements across multiple regulatory frameworks. We continuously evaluate updates to regulatory and emerging frameworks to evolve our compliance program accordingly.
We maintain clear documentation of our data processing activities, privacy policies, and data protection agreements. Customers can request details about how their data is handled at any time.