Trust, built-in.
Three architecture decisions we settled before writing the first line of code:
Permission is the first layer.
Every query is scoped to the requester's authorized context before retrieval — humans through enterprise SSO, agents through OAuth 2.1 scoped tokens (per the MCP standard). No one—and no agent—can access what the person running it can't.
Three deployment models on day one.
SaaS, BYOK (your LLM keys, your data path), VPC (entire pipeline inside your cloud). The data boundary is yours to choose.
Agents read entities, not transcripts.
Every response carries the verbatim quote that produced it, with identity-bound audit logging on every query. Agents never receive raw meetings, emails, or chats — only typed entities with source attribution.
SOC 2 Type II, data residency, and sub-processor disclosure are in scope. The architecture that makes them auditable — access control, identity-bound logging, encryption at rest and in transit — is inside the MVP build. Sub-processor list goes live at launch.