Skip to main contentSamelogic is designed to help teams capture and analyze UI elements without losing control of sensitive data. This page explains how we approach security and what to expect during vendor reviews.
Security overview
- Data is scoped by workspace and project to keep access intentional.
- Access is managed by administrators to keep permissions tight.
- Activity is traceable through audit-friendly workflows.
What data is stored
Samelogic stores the data needed to reproduce UI issues and improve selector stability:
- Element selectors and stability signals
- DOM metadata and element attributes
- Step replay timelines and diagnostics (console + network summaries)
- Project metadata, tags, and notes
Compliance and reviews
Enterprise buyers often request:
- Security questionnaires
- Data processing agreements (DPA)
- Architecture and data flow summaries
- Incident response and escalation procedures
Email [email protected] for the latest security documentation and review materials.
Responsible usage
Avoid capturing secrets or highly sensitive PII in production workflows. Use environment allowlists and internal guidelines to control what gets recorded.