Your Clients Trust You.
You Can Trust ALIS.

The organizations that rely on ALIS serve some of the most vulnerable people in our communities. We take that responsibility seriously — and we've built security into every layer of the platform.

Built Secure from the Ground Up

Security isn't a feature we added — it's a principle we designed around. Here's what that means in practice.

Encryption at Rest & in Transit

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Whether data is being submitted, stored, or retrieved, it is always protected.

Dedicated Server Instances

Each ALIS client runs on its own dedicated server — not a shared multi-tenant cloud environment. Your data is logically and physically isolated from every other organization. Prefer to host on your own infrastructure? ALIS can be deployed on your existing server as well.

Role-Based Access Control

Access to case records is controlled at the role, user, and field level. No user can access data outside their defined permissions — ever. Principle of least privilege enforced throughout.

Microsoft Entra SSO Ready

ALIS supports Microsoft Entra ID single sign-on out of the box. Staff authenticate with their existing Microsoft 365 credentials — no separate password, no extra friction, and full compliance with your organization's identity policies.

Immutable Audit Logs

Every action taken in the system is logged — who accessed it, what they did, and when. Logs are append-only and cannot be deleted or modified, even by administrators.

Data Ownership — Your Data, Always

Your organization owns its data entirely. We do not monetize, analyze, share, or use your clients' data in any way. You can export a full copy of your data at any time.

Backup & Recovery (included with hosted plans)

Automated daily backups with offsite storage. Documented recovery procedures tested regularly. Your data is never at risk of permanent loss.

Session Management

Automatic session timeout after configurable inactivity period. Secure logout invalidates server-side sessions immediately. Concurrent session controls available.

Regular Security Updates

Application security patches are applied promptly and included in all plans. Server-level security maintenance is included with hosted plans.

Security You Can Explain to Your Board

Security-by-Design

Security considerations are incorporated from the first line of code — not bolted on afterward. Input validation, output encoding, and injection prevention are built in throughout.

No Third-Party Tracking

No analytics trackers, advertising pixels, or behavioral profiling scripts. Your users' data stays in your system — it never flows to Google, Meta, or any other third party.

Data Minimization

ALIS only collects what your organization configures it to collect. No shadow fields, no hidden data collection, no retention of data beyond your configured policies.

Vulnerability Management

Dependencies are regularly scanned for known security vulnerabilities. Security patches are prioritized and deployed promptly. We maintain a responsible disclosure policy for security researchers.

Configurable Retention

ALIS supports configurable data retention policies — including archiving and deletion workflows — that can be implemented to align with your legal obligations and organizational policies.

Full Data Portability

Export your complete data set at any time in standard formats. If you ever leave ALIS, your data leaves with you — we don't hold it hostage or make export unnecessarily difficult.

Security Documentation for Your IT Team

Need to share security details with your IT director, legal counsel, or board? Contact us and we'll put together a security overview covering our data processing practices, encryption standards, and compliance posture.

Request Security Documentation

Have Specific Security Requirements?

We're happy to walk your IT team through our security architecture, answer specific compliance questions, or review your requirements together.

Contact Us About Security