Ashley is designed for data minimization, transparency, and control. This page explains exactly what Ashley can access, what Ashley stores (and never stores), and how we protect your data.
| Category | Stored? | Notes |
|---|---|---|
| Email bodies / mailbox content | No | Ashley does not request email read permissions and does not ingest mailbox content. |
| Calendar event bodies/details | No | Ashley may read event metadata for scheduling decisions, but does not persist event bodies/details in the database. |
| Contact lists | Not by default | Contacts access is used only for contact-related features (e.g., when you ask Ashley to help find/suggest a person). Ashley does not “download your address book” as a background process. |
| OAuth access tokens & refresh tokens | Yes | Stored to enable ongoing calendar connectivity. Currently stored as provided; protected by cloud controls and encryption at rest. Application-layer encryption is planned. |
| Request/response records (HITL) | Yes | Stored to support the Human-in-the-Loop experience and debugging. Current retention is indefinite; retention controls are on the roadmap. |
| Operational logs (service logs) | Yes | Standard service logs (warnings/errors). Sensitive fields (like tokens) are not logged. |
Questions? If you’re a customer doing vendor security review, email us and we can walk through a current architecture/data-flow diagram under NDA.
We believe trust starts with clarity. Here are the exact permissions Ashley requests for Google and Microsoft integrations. (Notice: no email read scopes.)
Ashley is built around the idea of Executive-in-the-Loop: the system can propose actions, but you stay in control. This approach reduces hallucination risk, prevents “excessive agency,” and makes behavior auditable.
We can provide an “AI Security & Governance” addendum on request (threat model, mitigations, and incident handling for AI-related events).
Ashley is actively pursuing SOC 2. Some controls are already in place through engineering workflows and cloud practices; others are in progress.
| Trust Services Criteria | Status | Notes |
|---|---|---|
| CC1 – Control environment | In progress | Core policy set being formalized for a single-founder company (lean but auditable). |
| CC2 – Communication & information | In progress | Customer-facing transparency pages (like this) + internal procedures are being finalized. |
| CC3 – Risk assessment | In progress | Formal annual risk assessment + vendor review process being documented. |
| CC4 – Monitoring | In progress | Centralized monitoring/alerting is being configured; operational logs exist today. |
| CC5 – Control activities | In progress | Controls exist (PR reviews/testing), mapping controls-to-risks is being formalized. |
| CC6 – Logical/physical access | Partial | MFA and environment isolation are in place; access review + token encryption improvements are planned. |
| CC7 – System operations | Partial | Backups/restores exist; formal incident response + monitoring playbooks are being finalized. |
| CC8 – Change management | Strong | Structured SDLC + PR reviews + CI/CD are established and auditable. |
If your organization requires a formal SOC 2 report before adoption, we can share our roadmap and current evidence package under NDA.
Ashley relies on best-in-class infrastructure and APIs to deliver core functionality. The set below is intentionally small.
Hosting (App Service) and primary datastore (Cosmos DB for MongoDB). Physical security and datacenter controls are provided by Azure.
Calendar + identity (and optional contacts read-only for contact-related features).
Calendar + identity (and optional contacts read-only for contact-related features).
LLM inference for natural-language planning/interpretation. (Direct OpenAI API, not Azure OpenAI.)
For security questions, vendor assessments, or to report a vulnerability, contact: security@wellnessatwork.me (or reply to your existing thread with us).
We’re happy to provide: architecture overview, data-flow diagram, scope list, and current SOC 2 evidence package under NDA.