Fojas

Security

Security Overview

The security posture behind Fojas voice AI deployments for enterprise phone operations.

Last updated: April 26, 2026

Regional isolation

Processing can be configured for KSA, UAE, or EU regions where available, with tenant isolation and explicit policies for cross-border data movement.

Data protection

Fojas supports PII redaction, customer-managed key workflows, signed call audit trails, and configurable retention, including zero-retention operation.

Operational controls

Production deployments use monitored infrastructure, carrier failover patterns, access controls, deployment review, backups, and incident response procedures.

Responsible disclosure

Security researchers can report vulnerabilities through hello@fojas.ai. See /.well-known/security.txt for the machine-readable policy.