BlockMatrix
Security and Trust

Security and Trust

Your data security is foundational to everything we build. Here is how we protect it.

Data handling

How we handle your data

BlockMatrix treats your data with the same care you would. Every piece of information that enters the platform is protected by multiple layers of security, from the moment it arrives to the moment it is accessed.

Encrypted in transit and at rest

All data is encrypted using TLS 1.3 during transmission and AES 256 encryption at rest. Your information is protected whether it is moving between systems or stored in our infrastructure.

No data sharing with third parties

We never sell, rent, or share your data with third parties for marketing or advertising purposes. Data is only processed by the services required to deliver the functionality you configured.

Data residency options

Choose where your data is stored. We offer regional data residency options to help you meet local compliance requirements and keep your information within the jurisdictions that matter to your business.

Access control

Granular controls at every level

Security is not just about encryption. It is about making sure the right people have access to the right data at the right time, and that every action is traceable.

Role Based Access Control

Granular permissions per user, team, and client. Define exactly who can view data, create workflows, approve actions, and manage integrations within each workspace.

Audit Logs

Complete activity trail for every action taken. Every login, configuration change, approval decision, and agent execution is recorded with timestamps, user identity, and context.

Approval Workflows

Human review required for sensitive operations. Configure thresholds for financial transactions, outbound volume, and data exports so nothing critical executes without explicit sign off.

Session Management

Automatic timeouts and device management. Sessions expire after configurable periods of inactivity, and administrators can view and revoke active sessions across all devices.

Encryption

Industry standard encryption at every layer

We use proven cryptographic standards to ensure your data remains confidential and tamper proof throughout its lifecycle.

TLS 1.3 in Transit

All connections between your browser, our API, and third party integrations are protected by TLS 1.3, the latest transport layer security protocol. Older protocols are disabled.

AES 256 at Rest

Data stored in our databases and file systems is encrypted using AES 256 bit encryption. Even in the unlikely event of physical media access, your data remains unreadable.

Key Rotation

Encryption keys are rotated on a regular schedule. Automated key management ensures that compromised keys have a limited window of exposure and that rotation happens without downtime.

Human handover

AI with human checkpoints

AI agents are powerful tools, but they are not autonomous. Every critical decision includes a human checkpoint. Guardrails prevent unwanted actions. Suppression rules protect sensitive contacts. Quiet hours respect boundaries. And every action is logged for review.

This philosophy extends across the entire platform. Whether an agent is sending an outreach sequence, categorizing a bank transaction, or generating a financial report, the same governance model applies. You define the boundaries, the AI works within them, and humans step in whenever the situation calls for judgment.

Questions about security?

Our team is happy to walk you through our security practices, compliance posture, and data handling policies.