Samelogic is designed to help teams capture and analyze UI elements without losing control of sensitive data. This page explains how we approach security and what to expect during vendor reviews.Documentation Index
Fetch the complete documentation index at: https://docs.samelogic.com/llms.txt
Use this file to discover all available pages before exploring further.
Security overview
- Data is scoped by workspace and project to keep access intentional.
- Access is managed by administrators to keep permissions tight.
- Activity is traceable through audit-friendly workflows.
What data is stored
Samelogic stores the data needed to reproduce UI issues and improve selector stability:- Element selectors and stability signals
- DOM metadata and element attributes
- Step replay timelines and diagnostics (console + network summaries)
- Project metadata, tags, and notes
Compliance and reviews
Enterprise buyers often request:- Security questionnaires
- Data processing agreements (DPA)
- Architecture and data flow summaries
- Incident response and escalation procedures