How is data security handled?The platform uses role-based access control, secure authentication, encryption (in transit and at rest), and audit logs to protect sensitive procurement and supplier data.