Regional isolation
Processing can be configured for KSA, UAE, or EU regions where available, with tenant isolation and explicit policies for cross-border data movement.
Security
The security posture behind Fojas voice AI deployments for enterprise phone operations.
Last updated: April 26, 2026
Processing can be configured for KSA, UAE, or EU regions where available, with tenant isolation and explicit policies for cross-border data movement.
Fojas supports PII redaction, customer-managed key workflows, signed call audit trails, and configurable retention, including zero-retention operation.
Production deployments use monitored infrastructure, carrier failover patterns, access controls, deployment review, backups, and incident response procedures.
Security researchers can report vulnerabilities through hello@fojas.ai. See /.well-known/security.txt for the machine-readable policy.