Last updated: March 3, 2026
Trust, security, and compliance are core to BRIXCOT’s lead management platform operations across UK/EU and US contexts.
BRIXCOT is designed to support secure, reliable, and compliant lead management operations.
We continuously improve controls for confidentiality, integrity, and availability of platform services.
Security and privacy are integrated into product, infrastructure, and operational processes.
Role-based access control and least-privilege principles are used to limit unauthorized access.
Authentication and account protections are applied to reduce credential misuse and account takeover risk.
Monitoring and logging controls support anomaly detection, incident triage, and auditability.
Data handling follows purpose limitation and minimization principles where feasible.
Data retention and deletion practices are aligned with business need and legal requirements.
Vendor and integration relationships are managed with contractual and operational safeguards.
For UK/EU contexts, controls are designed to support GDPR/UK GDPR principles, including transparency and rights management.
For US contexts, controls support applicable federal/state privacy and marketing compliance obligations.
Customers remain responsible for lawful campaign configuration and jurisdiction-specific obligations for their use cases.
Service health is monitored to maintain uptime, performance, and incident response readiness.
Change management and release practices are used to reduce operational risk.
We review and improve resilience controls as platform complexity and customer needs evolve.
Security events are assessed through defined workflows covering detection, containment, remediation, and review.
Where legally required, notifications are issued to affected parties and authorities within required timelines.
Responsible Disclosure supports coordinated reporting by security researchers.
Customers should implement strong access hygiene, consent-compliant lead sourcing, and lawful outreach practices.
Users are responsible for safeguarding credentials and promptly reporting suspected misuse.
Customers should review legal pages regularly and configure controls based on their jurisdiction and operational model.