Legal

Security at Letaro

How AI Cloud Solutions t/as Letaro approaches tenant isolation, role-based access, audit logs, sessions, webhook verification, backups, integrations, and custom feature release checks.

Security

AI Cloud Solutions t/as Letaro treats tenant isolation, access control, auditability, secure billing events, and operational monitoring as core platform requirements.

Summary

  • Role-based access controls should limit staff actions to authorised agency roles and module entitlements.
  • Tenant isolation checks should be enforced on backend requests, data access paths, portal workflows, reports, exports, and automation jobs.
  • Portal users should remain scoped to the authenticated tenant, owner, tenant, property, lease, or communication context they are permitted to access.
  • Audit logs should capture important trust accounting, finance, portal, billing, workflow, and security events without exposing passwords, tokens, card data, or raw secrets.
  • Authentication should support secure sessions, password controls, two-factor authentication pathways, and defensive handling of failed or suspicious sign-in attempts.
  • Stripe webhook signatures must be verified before subscription, checkout, or provisioning changes are trusted.
  • AI, email, SMS, and integration jobs should use scoped credentials, conservative logging, retry controls, and clear failure states.
  • Security-sensitive configuration belongs in environment settings or managed secrets, not in public repositories or client-side code.
  • Backups, restore rehearsals, migration checks, and release verification should be maintained so operational recovery paths are tested.
  • Custom features and integrations should include security review for tenant isolation, permissions, validation, logging, and data retention before release.
  • Customers should promptly report suspected unauthorised access, exposed credentials, or security issues to info@letaro.com.au.
  • Security documentation is updated as Letaro matures and should be reviewed alongside customer contracts, privacy materials, and implementation scope.