Back to operations
Trust architecture

You stay in control. ISURA only assists.

Every line of access, every action, and every reply is bound to your explicit approval.

Human approval required
Read-only mode available
Disconnect anytime
No training on your data
  1. 01

    How ISURA accesses your email

    ISURA connects through your provider's official OAuth flow. We never see, store, or request your password. The connection is scoped to the minimum permissions needed for cognitive analysis.

  2. 02

    OAuth, in plain language

    OAuth is the same standard your bank, calendar, and operating system use. You authorize ISURA on Google's or Microsoft's own page — your credentials never reach us.

  3. 03

    Encryption in transit and at rest

    All traffic is encrypted with TLS 1.3. Stored analysis artifacts are encrypted at rest using AES-256. Access tokens are isolated per workspace and rotated automatically.

  4. 04

    Human approval architecture

    ISURA prepares drafts. You approve them. Nothing is ever sent on your behalf without an explicit click. Replies are queued, never auto-fired — even on routine threads.

  5. 05

    Data privacy

    Your messages remain yours. ISURA processes content only to serve the live request. We do not sell, share, or expose your data to third parties beyond the AI inference provider bound by strict zero-retention agreements.

  6. 06

    No training on your private email

    Your emails are never used to train any model — ours, our providers', or anyone else's. This is contractual, not optional.

  7. 07

    Permission management

    Switch to read-only mode at any time. Pause analysis. Disconnect your account in one click — your tokens are revoked immediately and stored artifacts are purged within 24 hours.

Calm, transparent, controlled.

ISURA is built so the most cautious operator can use it without hesitation.