Privacy

Privacy expectations for the Coledger workspace.

This page outlines the baseline privacy posture for evaluation environments and production usage. It is intended to give operators, buyers, and reviewers a clear overview of how workspace data is handled.

Data minimizationRole-based accessOperational logging

Information handled by the platform

Coledger processes account structures, transactional records, receipts, planning inputs, and operational metadata needed to run financial workflows. Access to this data is constrained by authenticated workspace access and application permissions.

Evaluation and demo environments should not be used for confidential regulated data unless the environment has been explicitly approved for that purpose.

Usage and retention

Application telemetry, audit trails, and workflow logs may be retained to support troubleshooting, security review, and operational reliability. Retention should align with the deployment environment and customer agreement.

If you need formal privacy terms for a commercial deployment, this page should be replaced or supplemented with your legal-approved policy text before broad external distribution.

Next step

Continue into the product surface to review live finance workflows, operator queues, and the seeded workspace experience.

Review security posture