Access
Workspace access is role based.
Dashboard access uses Supabase Auth with workspace roles and auditable ownership boundaries.
- Owner
- Admin
- Member
Security
TrueClara keeps the security story in the same product language: what is collected, where it is processed, who can access it, and how incidents are handled.
Operating model
Each product surface follows the same loop: define the route state, compare the release window, carry evidence into the decision.
Access
Dashboard access uses Supabase Auth with workspace roles and auditable ownership boundaries.
Data
Traffic is encrypted in transit, and managed providers encrypt application and warehouse data at rest.
Vendors
Hosting, warehouse, auth, cache, billing, and email vendors are listed in the legal packet and updated as they change.
Response
Incident response uses severity classification, on-call ownership, and customer notification for material workspace impact.
Before / after
The redesign keeps comparison visible because the product promise is not more charts. It is a cleaner handoff from release to action.
Security details live across scattered pages.
Security, DPA, privacy, and subprocessors form one packet.Incident response is implied.
Disclosure, acknowledgement, and notification windows are stated.Managed service dependencies are unclear.
Subprocessors are published for review.Get started
Use the DPA, subprocessors page, and security contact together for procurement review.