How is data security handled?

The platform uses role-based access control, secure authentication, encryption (in transit and at rest), and audit logs to protect sensitive procurement and supplier data.

Users also asked