You stay in control. ISURA only assists.
Every line of access, every action, and every reply is bound to your explicit approval.
- 01
How ISURA accesses your email
ISURA connects through your provider's official OAuth flow. We never see, store, or request your password. The connection is scoped to the minimum permissions needed for cognitive analysis.
- 02
OAuth, in plain language
OAuth is the same standard your bank, calendar, and operating system use. You authorize ISURA on Google's or Microsoft's own page — your credentials never reach us.
- 03
Encryption in transit and at rest
All traffic is encrypted with TLS 1.3. Stored analysis artifacts are encrypted at rest using AES-256. Access tokens are isolated per workspace and rotated automatically.
- 04
Human approval architecture
ISURA prepares drafts. You approve them. Nothing is ever sent on your behalf without an explicit click. Replies are queued, never auto-fired — even on routine threads.
- 05
Data privacy
Your messages remain yours. ISURA processes content only to serve the live request. We do not sell, share, or expose your data to third parties beyond the AI inference provider bound by strict zero-retention agreements.
- 06
No training on your private email
Your emails are never used to train any model — ours, our providers', or anyone else's. This is contractual, not optional.
- 07
Permission management
Switch to read-only mode at any time. Pause analysis. Disconnect your account in one click — your tokens are revoked immediately and stored artifacts are purged within 24 hours.
Calm, transparent, controlled.
ISURA is built so the most cautious operator can use it without hesitation.