Trust Center

Throughline · security & privacy posture

Last updated: 2026-05-05. This page summarises Throughline's security and privacy practices for procurement and security review. The deeper structural privacy document covers data flows + retention in detail. The same source content lives in the repo at docs/soc2/trust-center.md for vendor questionnaires.

Posture summary

Subprocessors

Throughline uses the following subprocessors to deliver the service. Customers can subscribe to subprocessor-change updates via the security@throughline.dev mailing list (30-day notice for material additions).

VendorPurposeRegionData exposed
VercelAPI + admin web hostingUS (multi-region edge)Application traffic; no app-data at rest
NeonPostgres database (commitments, audit, members)US-East (configurable)All app data at rest, encrypted
InngestDurable workflow orchestrationUSJob arguments and intermediate state
Vercel AI GatewayLLM gateway for noop-gate, classifier, injection-defenseUS-EastCapture intent text + integrator rules at inference time
AnthropicUnderlying LLM (Claude via AI Gateway)USSame as above
ResendOutbound email deliveryUSRecipient email + message body
TelnyxOutbound SMS deliveryUS/UKRecipient phone + message body
TwilioWhatsApp Business API deliveryUSRecipient phone + message body
VapiOutbound voice (only on enterprise + verified)USRecipient phone + call transcript
Firebase Cloud MessagingMobile push notificationsUSDevice tokens + push payload
SlackSlack DM channel (when integrator opts in)Customer Slack workspace regionRecipient Slack ID + message body
Microsoft TeamsTeams DM channel (when integrator opts in)Customer M365 regionRecipient Teams ID + message body
GoogleCalendar OAuth + push notifications (Phase 5)US/EU per Google policyCalendar event metadata; OAuth tokens encrypted at rest

Data retention

Audit retention defaults to 7 years (most enterprise contracts require it). Each teamspace can configure down to 90 days for GDPR-strict workloads; lower than 90 is rejected at write time. Other data classes retain per the table below.

ArtefactDefault retentionConfigurable
Audit log events7 years (2555 days)Down to 90 days per teamspace
OAuth tokens (Google Calendar, etc.)Until user revokesAuto-purged on user deletion
Commitments + campaigns1 year past closeGDPR purge endpoint clears earlier
Touch / channel delivery recordsSame as parent campaignInherits
LLM inference logs0 days at ThroughlineVercel AI Gateway settings on customer account

Encryption

Access controls

Compliance status

Vulnerability disclosure

Security researchers can report vulnerabilities to security@throughline.dev. Our public security.txt lives at /.well-known/security.txt (Phase 7.7). Coordinated disclosure is preferred; please allow 90 days before publishing.