SECURITY

Security & Privacy
at Sharly

We believe at Sharly, security is foundational, not optional. Our dedication to innovation ensures

your data's safety, your workspace's privacy, and your information's reliability.

GOVERNANCE

At Sharly, we lay the groundwork for impenetrable security measures,

continuously assess their impact to confirm their steadfastness, and

maintain an open dialogue about our compliance

with these measures through clear, independent audits.

Vittorio Furlan

CEO, Foray Advisory

Restrictive Access. Data access is confined to only those essential team members, adhering to the least privilege principle.

Multi-Tiered Security Measures.Our security utilizes a multi-layered defense, with backup safeguards for breach resilience.

Uniform Security Measures. Security controls are uniformly applied across all areas, providing consistent defense against threats.

Continuous Improvement. Our controls are persistently enhanced to stay ahead of the changing security environment.

We implement rigorous measures
to guarantee the security of our product.

Data segregation. We use row-level access controls to segregate data by workspace and organization.


Data encryption. We use AES-256 encryption for data and chats at rest, and TLS 1.3 with AES-256 for data in transit.

No training data for LLMs. Sharly employs models that strictly prohibit the use of input data for any model re-training purposes.

Vulnerability Assessments. Our scans are deployed at key stages to preemptively identify and mitigate potential security vulnerabilities.

Audit logs. Every operation is closely tracked, logged, and available for detailed analysis whenever needed.


Data retention. Your data are automatically deleted if you don't user Sharly for over 30 days


Real-time Access Control. We apply source system permissions automatically to all Sharly integrations.

Sensitive Data Redaction. The system scans for personally identifiable information (PII) in real-time, ensuring its removal.

Data Hallucination Resistance. We employ RAG for accuracy and have safeguards to prevent data distortions.