Security at Apex Lead Intelligence

Last Updated: April 23, 2026

🔒

Encryption at Rest

All data encrypted using AES-256 at rest in TiDB Cloud and Amazon S3.

🔐

Encryption in Transit

All connections secured with TLS 1.2+ — no unencrypted data transmission.

🛡️

Access Controls

Role-based access control. Admin and client roles with least-privilege enforcement.

🔑

Authentication

JWT-based session tokens with secure HttpOnly cookies. OAuth 2.0 for admin access.

📋

Audit Logging

All admin actions and data access events are logged with timestamps and user identity.

🗑️

Data Retention

Call recordings retained 12 months. Personal data deleted within 30 days of account termination.

Infrastructure Security

The ALI platform is hosted on enterprise-grade cloud infrastructure. Our database is powered by TiDB Cloud (PingCAP), which provides automatic failover, point-in-time recovery, and geo-redundant backups. File storage uses Amazon S3 with server-side encryption enabled on all buckets. All services run behind a reverse proxy with DDoS protection and rate limiting.

Application Security

  • All API endpoints protected with authentication and authorization checks
  • Input validation and parameterized queries to prevent SQL injection
  • CSRF protection on all state-changing operations
  • Content Security Policy (CSP) headers on all pages
  • Dependency vulnerability scanning via automated tooling
  • Secrets managed via environment variables — never hardcoded in source code

TCPA & Compliance Controls

  • FCC Reassigned Numbers Database (RND) check before every outbound call via Telnyx
  • Internal Do Not Call list enforced at the dialer level — numbers cannot be called after opt-out
  • Business hours enforcement — calls only placed during client-configured calling windows
  • Call attempt caps per contact to prevent harassment
  • All call recordings stored securely and accessible only to authorized account holders

Certifications & Compliance Roadmap

FrameworkStatusNotes
TCPA Compliance✓ ActiveRND checks, DNC enforcement, consent tracking
CAN-SPAM Compliance✓ ActivePhysical address, unsubscribe mechanism, honest headers
CCPA Compliance✓ ActiveDo Not Sell page, privacy request form, data deletion
SOC 2 Type II⏳ In ProgressAudit preparation underway — expected 2026
GDPR⏳ PartialDPA available; SCCs available on request

Reporting a Security Issue

If you discover a security vulnerability in the ALI platform, please report it responsibly to [email protected] with the subject line "Security Vulnerability Report." We will acknowledge receipt within 48 hours and work to resolve confirmed issues within 30 days. We do not currently offer a bug bounty program but appreciate responsible disclosure.

Contact

Apex Lead Intelligence LLC

202 Walton Way Suite 192 Unit #715, Cedar Park, Texas 78613

Security contact: [email protected]