Asylon

Security Overview

A quick summary of how we secure reports, attachments, and follow-up conversations.

Data in transit & at rest

  • HTTPS everywhere; signed links for attachment previews and downloads.
  • Stored files are protected in restricted storage with access limited to authorized reviewers.
  • Audit logs track administrative actions for accountability.

Anonymity safeguards

  • Anonymous submissions by default; contact info optional.
  • Voice anonymization available for uploaded/recorded audio.
  • IP and device details are suppressed when ultra-private mode is enabled.

Data retention & access

  • Retention follows your organization’s policies; data can be removed upon authorized requests.
  • Role-based access limits who can view or act on reports.
  • No third-party analytics or tracking on reporting portals.

Operational practices

  • Signed URLs for attachments expire and cannot be guessed.
  • Alerts are routed to authorized administrators and reviewers only.
  • Incident response playbooks ensure timely review of urgent cases.

Questions or requests?

Reach us at info@asylon.cc or support@asylon.cc.