Security & Trust
How PO-Relay keeps you in control
You're giving an AI access to your supplier emails and PO data. Here's exactly how we handle that — and the hard boundaries built into the code itself, not just policies.
You stay in the loop on every communication
The assistant drafts follow-up emails pre-loaded with full context — the history, the risk, what's been communicated. You review every draft and send it from your own email client.
Your systems stay untouched
PO-Relay reads your email and ERP data to track deliveries. It only writes to its own data layer — your source systems are never modified.
All decisions stay with you
Financial and contractual decisions require you. The assistant surfaces information and recommendations with supporting evidence. You decide what happens next.
Every action is logged
Full activity log visible in the UI. Zero silent failures. You can see exactly what the assistant classified, flagged, updated, and drafted — and when.
Evidence comes before recommendations
Every recommendation includes the data that prompted it — the supplier email, the timeline, the specific risk signal. You can always trace back to the source.
Facts are clearly separated from suggestions
The assistant labels what it knows (data from your ERP and supplier emails) separately from what it suggests (recommendations you can accept or ignore).
How we access your data
These aren't aspirational policies. They're constitutional governance — hard constraints enforced in the code itself.
- ✓Gmail: OAuth read-only access. PO-Relay reads supplier emails to classify and match them to your POs. Your inbox is never modified.
- ✓ERP: Read-only data connection. PO-Relay reads PO line items daily to detect new orders and receipts. It never writes back.
- ✓Your data is never used to train models or shared with third parties.
Questions about security? Contact us.