Security

SOC 2 approach, data handling, and compliance notes.