← Back to home

Security

Last updated: April 27, 2026

SmartTakeoffs handles two things foodservice equipment dealers care about most: their bid documents and their rep relationships. This page explains, in plain language, how we keep that data safe — where it lives, how it's encrypted, who can access it, and the third-party services we rely on. For the legal version, see our Privacy Policy.

At a glance

Data hostingU.S.-based cloud providers (AWS & Cloudflare regions)
Encryption in transitTLS 1.2+ for all traffic
Encryption at restAES-256 at the storage layer; app-level encryption on sensitive fields
Tenant isolationPer-tenant separation enforced at both the auth layer (Clerk) and the database (Postgres row-level security)
AuthenticationClerk — SSO-ready, MFA available, session JWTs
Customer data & AI trainingYour bid documents are never used to train third-party general-purpose AI models

Where your data lives

Different types of data live in different places, all hosted in the United States by established cloud providers:

Encryption

All traffic between your browser, our application, and our backend services uses TLS 1.2 or newer. Object storage and database storage are encrypted at rest using AES-256 by the underlying provider (Backblaze B2, Supabase, and Railway).

On top of that, we apply application-level encryption to sensitive fields in our database (such as outbound email credentials and third-party API keys configured per tenant) using a server-side encryption key that lives only in production environment variables and is never checked into source control or shared between environments.

Tenant isolation

SmartTakeoffs is multi-tenant: many dealers use the same application, but each dealer's data is logically isolated. Isolation is enforced at three layers:

Access controls

Within a dealer account, users are assigned roles (estimator or admin). Admins manage the team; estimators run takeoffs and edit their own projects. All edits are captured with version history so you can see who changed what.

Production access at SmartTakeoffs is limited to a small operations team using individually-scoped credentials. Production access is granted on a least-privilege basis and is logged. We never use shared admin accounts. Direct database access in production is reserved for incident response and is audited.

Customer data and AI

SmartTakeoffs uses Anthropic's Claude models to read project manuals and drawings. By default, Anthropic's API does not train on customer inputs or outputs. Your bid documents are sent to the Anthropic API only for the purpose of running your takeoff and are not retained for any other use.

We may use anonymized, aggregated metrics from extraction runs (for example, how often a particular MFR/model combination shows up across the platform) to improve the product. We do not share or sell identifiable customer content.

Backups and recovery

Our PostgreSQL database is automatically backed up by Supabase with point-in-time recovery enabled. Object storage at Backblaze B2 is durably stored across multiple disks and validated against checksums. We periodically rehearse restore-from-backup and disaster-recovery procedures.

Secure development

Subprocessors

We rely on a small set of established providers to operate the Service. The current list lives in our Privacy Policy § 6 and is kept current. We notify customers when a material subprocessor change happens.

Compliance and certifications

SmartTakeoffs is an early-stage product and does not currently hold SOC 2, ISO 27001, or HIPAA certifications. We follow the controls described above as a matter of practice, and we're happy to discuss our security posture in detail with prospective customers whose procurement process requires it. Reach out at hello@smarttakeoffs.com.

Reporting a security issue

If you believe you've found a vulnerability or security concern, email hello@smarttakeoffs.com with the details. We'll respond promptly, work with you to verify and reproduce the issue, and remediate as quickly as we can. We ask that researchers act in good faith, avoid degrading the service, and give us a reasonable window to respond before public disclosure.

Incidents

If we become aware of a security incident that affects customer data, we will notify affected dealers without undue delay, share what we know about scope and impact, and describe remediation steps. We maintain an internal runbook for incident response and update it after every event we exercise it on.