Security & Privacy at Settle

We take the security of your data seriously. All customer data is processed and stored in the United States, never leaves our infrastructure, and is never used to train models — ours or any third party’s.

This page summarizes how we handle data, our core security practices, and the subprocessors we use.

How We Handle Your Data

Security Overview

Our infrastructure is built on industry-standard, secure cloud services and follows best practices for modern web applications.

Our Subprocessors

To provide Settle’s services, we work with a small set of trusted third-party vendors (“subprocessors”). Each partner is carefully vetted for security and privacy practices. This list is kept up to date — check back any time for the latest version.

Last updated: September 19, 2025
VendorPurposeData ProcessedRegionPrivacy / Security Info
Microsoft AzureCloud hosting, compute, storage, managed Postgres, Blob Storage (document upload/download), Cognitive Search (search indexing/retrieval), Azure OpenAI (LLM, embeddings, completions)Customer content, metadata, uploaded documents, indexed content, AI feature dataUSPrivacy & Security
Vercel AIOrchestrates AI requests to Azure OpenAIMetadata, AI request logsUSTrust & Security
SlackNotifications and bot messagesMessage content, metadataUSSecurity
PostHogAnalytics and event trackingUsage data, pseudonymous IDsUSPrivacy
WorkOSAuthentication and SSOAccount info, SSO metadataUSSecurity
SentryError monitoring and reportingTelemetry, pseudonymous IDs, stack tracesUSSecurity
ResendTransactional and notification email deliveryEmail addresses, notification contentUSSecurity
BraintrustModel evaluation and benchmarkingModel outputs, evaluation dataUSPrivacy
CloudflareCDN, security, and edge servicesNetwork metadata, edge logsUSTrust & Safety

Questions?

Have questions about security or privacy at Settle? Reach us at [email protected].