Security & Compliance

Protecting your data, privacy, and trust.

At SAMS, security is not an add-on, it’s built into the product from day one. Architecture and construction firms rely on sensitive operational, financial, and client information. We take that responsibility seriously by ensuring that data remains private, protected, and available only to authorized users.

Data Protection & Encryption

We use modern encryption standards to safeguard all customer data:

  • In Transit: All data transmitted between client devices and our servers is encrypted using HTTPS/TLS.
  • At Rest: Core application data and backups are stored using industry-grade encryption protocols.
  • Credential Security: Sensitive credentials like passwords and API tokens are hashed, not stored in plain text.

This ensures that unauthorized access to data is prevented even at the infrastructure level.

User Access & Permissions

SAMS gives firms full control over who can access what:

  • Role-based access control (RBAC)
  • Granular permissions for sensitive operations
  • Multi-user workspaces with defined responsibilities

Teams can delegate tasks without exposing financials, drawings, or project-level information unnecessarily.

Data Ownership & Privacy

Your data is 100% owned by your company. We never sell, share, or use customer data for advertising or third-party enrichment.

We only use your data to operate and improve the SAMS platform.

Upon request, customers may:

  • Export their data
  • Request data deletion
  • Request account closure

This gives firms full control over their information lifecycle.

Backups & Continuity

To minimize the risk of data loss, SAMS maintains:

  • Scheduled system backups
  • Redundant storage
  • Disaster recovery workflows

These measures ensure that project information, timesheets, payment logs, and operational records remain intact even under failure scenarios.

Infrastructure & Hosting

SAMS is hosted on secure, industry-trusted infrastructure providers that maintain:

  • Physical data center security
  • Uptime and redundancy guarantees
  • Power, hardware, and network resilience

This helps architecture firms operate without worrying about infrastructure management or uptime issues.

Secure Development Practices

Our engineering processes include:

  • Internal code reviews
  • Version control and audit history
  • Regular dependency & security patching
  • Environment separation for testing and production

This reduces application vulnerabilities and ensures consistent stability.

Compliance & Legal

We strive to align with global best practices around data privacy and handling, including principles similar to:

  • GDPR (General Data Protection Regulation) — privacy and data ownership
  • Data minimization — only storing what is necessary for functionality
  • Consent-based communication

As we expand into multiple regions, we are continually evaluating additional compliance frameworks relevant to architectural and enterprise software.

Vulnerability & Incident Response

If a potential security issue is discovered:

  • It is assessed and prioritized based on severity.
  • Fixes and patches are rolled out as quickly as possible.
  • Customers are informed if they are impacted.
  • Preventive measures are updated.

We also encourage responsible disclosure from security researchers and technical partners.

Your Responsibility as a Workspace Owner

Security is a shared effort. To maintain a secure environment, workspace owners should:

  • Manage user access and roles actively
  • Deactivate accounts for departing team members
  • Use strong passwords
  • Avoid sharing credentials across users

SAMS provides the tools; firms decide how they’re used.

Questions About Security?

If you have specific compliance requirements or need a security review for procurement, contact us at:

📩 [email protected]

We’re happy to support your IT, procurement, or compliance teams.

© 2022-2025 | SAMS | All Rights Reserved