Security Policy

Last Updated: April 18, 2026

At WHYUSER, INC, we understand that we are processing highly sensitive Go-To-Market assets and proprietary sales intelligence. We will use commercially reasonable efforts to secure the Cloud Service from unauthorized access, alteration, or use and other unlawful tampering.

This document outlines the technical and organizational security measures we employ to protect Customer data.

1. "Privacy-First" Ingestion Architecture

WhyUser employs a 'Privacy-First' ingestion architecture. All unstructured data (e.g., Gong/Chorus transcripts) is programmatically redacted for Personally Identifiable Information (PII) at the ingestion layer (in volatile memory) before simulation processing occurs.

2. Multi-Tenancy & Tenant Isolation

WhyUser's production platform is multi-tenant. Customer data is isolated at multiple layers:

3. Encryption Standards

We mandate strict encryption protocols for all data traversing our systems or residing within our infrastructure:

4. Infrastructure & Edge Hardening

Our Cloud Service is hosted exclusively on Amazon Web Services (AWS) — AWS Lightsail Ubuntu compute instances and AWS S3 storage, in US-based regions only. AWS maintains SOC 2 Type II, ISO 27001, and FedRAMP certifications for its infrastructure services.

5. Access Control

6. Subprocessor & LLM Security

WhyUser leverages industry-leading Large Language Models (LLMs) to power our simulations. We enforce the following strict boundaries with our AI subprocessors (OpenAI, Anthropic, Google):

7. Vulnerability Management

8. Logging & Monitoring

9. Incident Response & Breach Notification

WhyUser maintains a documented Incident Response Policy with four severity levels and a defined six-phase response flow (Detect → Triage → Contain → Eradicate → Recover → Post-Incident Review).

For any confirmed Personal Data Breach affecting a Customer, WhyUser will notify the affected Customer without undue delay, and in any event within 72 hours of confirming the breach. Disclosure is subject only to delays specifically required by law enforcement or legal process.

10. Audits & Compliance

WhyUser is pre-SOC 2. Our Cloud Service is hosted exclusively on Amazon Web Services (AWS) infrastructure — Lightsail compute and S3 storage, US-based regions only — which maintains SOC 2 Type II, ISO 27001, and FedRAMP certifications. AWS's SOC 2 Type II report is available on request via AWS Artifact.

A Data Protection Addendum (DPA) is available at whyuser.com/dpa. For enterprise engagements, WhyUser offers a custom DPA in the Bonterms framework on request. WhyUser will complete your organization's standard vendor security questionnaire upon request.

Formal SOC 2 attestation will be pursued as driven by customer requirements, contractual obligations, and business stage.

For audit rights, security assessments, or to request our DPA, contact security@whyuser.com.

11. Security Inquiries & Vulnerability Reporting

If you have questions about our security practices, or if you believe you have discovered a vulnerability in our Service, please contact our security team immediately at security@whyuser.com. We will acknowledge reports within 5 business days.