Demo ModeSample Data OnlySecurity / Data Handling & Compliance
Operating Flow
IntakeSource MapLeakage RegisterExposure ModelOwner Queue
Scope Intake

Security

Data handling and security architecture.

Operator data is isolated, encrypted in transit and at rest, and never shared without consent. Fresh Margin follows security-conscious operating practices. No formal security certification is currently claimed.

Security controls

Active security controls.

Data isolation

Active

Operator data is stored in isolated workspaces. No operator can access another operator's records.

Encryption in transit

Active

Data transfer uses industry-standard transport encryption. Record uploads, API requests, and artifact delivery are protected in transit.

Encryption at rest

Active

Stored records and artifacts use cloud-provider encryption at rest where available.

Access controls

Active

Access is restricted to assigned team members. No broad shared credentials. Operator workspaces are separated.

Audit logging

Active

Access to operator data is logged where system logs are available. Operators can request activity summaries.

Data retention

Active

Operator data is retained only as long as needed for active reviews. Operators can request deletion at any time.

No third-party training

Active

Operator data is never used to train general-purpose models or shared with third-party AI services.

Consent-first sharing

Active

Operator data is never shared with partners, vendors, or other operators without explicit written consent.

Compliance

Compliance posture.

  • +Not currently SOC 2 certified. Security practices are informed by common B2B expectations.
  • +GDPR data subject rights honored
  • +CCPA data deletion and portability supported
  • +No financial or health data processed
  • +No payment card data stored

Data types

What data Fresh Margin uses.

Order exports

Medium

Basket economics and leakage analysis

POS reports

Medium

Sales and category contribution mapping

Vendor cost files

High

Vendor drift detection and COGS modeling

Delivery policies

Low

Zone risk and courier exposure analysis

Labor assumptions

Medium

Pick/pack labor exposure estimation

Substitution logs

Medium

Substitution behavior and margin impact

Refund records

Medium

Refund root-cause analysis

Inventory snapshots

Medium

Stockout and dead-stock analysis

System LogConsole simulation
09:12Intake scope received - pickup, delivery, prepared food
09:18Delivery policy mapped - 3 zones, peak window flagged
09:27Marketplace fee burden classified - promo compression detected
09:34Substitution exposure pending item-level data
09:41Owner queue generated - 4 decisions queued
09:52Operator readout ready - assumption labels applied
Scanning sample workflows...

Next step

Security is part of every engagement.

Operator data is protected with encryption, isolation, and access controls. Read our full security posture or request a data handling discussion.

Request Product Access

Security-conscious practices

Start