top of page
AI Applications
Pricing
Principles
Encryption
We use RSA 4096 field-level encryption, two-factor authentication, biometric verification and several additional layers of best-in-market security protocols.
Consent
When making an information request, individuals or businesses must explain why they need it, ensuring you always know how your information is being used.
Control
Only you decide who has access to your information, for how long and for what purpose. You can also expire vault access or revoke permission at any time
Compliance
All information gathered, stored and shared from a Cowrie vault is 100% in compliance with Protection of Personal Information Act and the General Data Protection Regulation.
Tech Support
bottom of page