Security & trust

Security controls built for
operational data

Prodica is designed with tenant isolation, role-based permissions, and activity visibility to reduce security and compliance risk.

Controls

Layered security by design

Every layer — data isolation, access control, audit trail — is built in, not bolted on.

Tenant isolation

Every organisation lives in its own data scope. Queries, records, roles, and user permissions are all bound to a tenant ID so data can never cross organisational boundaries.

Scoped queriesMulti-tenantData separation

Role-based access control

Granular permissions per role mean users only access modules and actions they need — least-privilege enforced at the application layer.

RBACGranular permissions

Activity audit trail

Every significant action is logged with timestamp, user, and context so you can reconstruct what happened, when, and by whom.

Activity logsLogin history

Platform administrator oversight

Superadmin and Admin platform roles provide cross-organisation audit visibility, support queue management, and user governance — without mixing tenant data.

SuperadminOversight

Compliance-ready operations

Clear role definitions, documented activity logs, cookie consent controls (UK GDPR / PECR compliant), and tenant-scoped data storage help you satisfy internal governance and customer assurance requirements.

UK GDPRPECRAudit-readyCookie consent

Shared responsibility

What we handle vs. what you control

Platform level

  • Tenant data isolation at query level
  • Application-layer access control
  • Login history and audit logs
  • Cookie consent controls
  • Middleware security checks

Your organisation

  • Assign appropriate roles to users
  • Review activity logs regularly
  • Use strong passwords and 2FA
  • Infrastructure security (for self-hosted)
  • Staff access review policies

Questions about our security approach?

Contact our team for a technical overview or custom deployment security discussion.