Security & Compliance
At SAMS, security is not an add-on, it’s built into the product from day one. Architecture and construction firms rely on sensitive operational, financial, and client information. We take that responsibility seriously by ensuring that data remains private, protected, and available only to authorized users.
Data Protection & Encryption
We use modern encryption standards to safeguard all customer data:
- In Transit: All data transmitted between client devices and our servers is encrypted using HTTPS/TLS.
- At Rest: Core application data and backups are stored using industry-grade encryption protocols.
- Credential Security: Sensitive credentials like passwords and API tokens are hashed, not stored in plain text.
This ensures that unauthorized access to data is prevented even at the infrastructure level.
User Access & Permissions
SAMS gives firms full control over who can access what:
- Role-based access control (RBAC)
- Granular permissions for sensitive operations
- Multi-user workspaces with defined responsibilities
Teams can delegate tasks without exposing financials, drawings, or project-level information unnecessarily.
Data Ownership & Privacy
Your data is 100% owned by your company. We never
sell, share, or use customer data for advertising or third-party
enrichment.
We only use your data to operate and improve the SAMS platform.
Upon request, customers may:
- Export their data
- Request data deletion
- Request account closure
This gives firms full control over their information lifecycle.
Backups & Continuity
To minimize the risk of data loss, SAMS maintains:
- Scheduled system backups
- Redundant storage
- Disaster recovery workflows
These measures ensure that project information, timesheets, payment logs, and operational records remain intact even under failure scenarios.
Infrastructure & Hosting
SAMS is hosted on secure, industry-trusted infrastructure providers that maintain:
- Physical data center security
- Uptime and redundancy guarantees
- Power, hardware, and network resilience
This helps architecture firms operate without worrying about infrastructure management or uptime issues.
Secure Development Practices
Our engineering processes include:
- Internal code reviews
- Version control and audit history
- Regular dependency & security patching
- Environment separation for testing and production
This reduces application vulnerabilities and ensures consistent stability.
Compliance & Legal
We strive to align with global best practices around data privacy and handling, including principles similar to:
- GDPR (General Data Protection Regulation) — privacy and data ownership
- Data minimization — only storing what is necessary for functionality
- Consent-based communication
As we expand into multiple regions, we are continually evaluating additional compliance frameworks relevant to architectural and enterprise software.
Vulnerability & Incident Response
If a potential security issue is discovered:
- It is assessed and prioritized based on severity.
- Fixes and patches are rolled out as quickly as possible.
- Customers are informed if they are impacted.
- Preventive measures are updated.
We also encourage responsible disclosure from security researchers and technical partners.
Your Responsibility as a Workspace Owner
Security is a shared effort. To maintain a secure environment, workspace owners should:
- Manage user access and roles actively
- Deactivate accounts for departing team members
- Use strong passwords
- Avoid sharing credentials across users
SAMS provides the tools; firms decide how they’re used.
Questions About Security?
If you have specific compliance requirements or need a security review for procurement, contact us at:
📩 [email protected]
We’re happy to support your IT, procurement, or compliance teams.

