Outreach Legal

Security Policy

Provides a practical security overview for credentials, event logging, access control, retention, deletion, and incident handling.

Last updated: April 3, 2026 | Back to legal center

Security Controls

Micro Outreach applies layered controls to protect credential material, account access, and outreach metadata.

  • Credential storage protections and least-privilege access.
  • Administrative access controls and audit logging.
  • Retention and deletion controls by data category.
  • Incident triage and response process.

Customer Responsibilities

Customers are responsible for protecting their own provider credentials, user seats, and local systems interacting with Micro Outreach.