Trust & compliance
Security, legal, and procurement
Route5 is built for teams that need structured intelligence from text. This page is the concrete path for security questionnaires, DPA requests, procurement (NET terms, invoices), and larger rollouts — including custom retention and VPC / bring-your-own conversations.
Security questionnaire
Use the outline below as a starting point for your vendor review. Send the completed context (or your own questionnaire) to us via the contact form (subject line is prefilled). We respond with written answers and point-in-time detail suitable for your InfoSec review.
Organization & scope
- Legal name, HQ region, and primary industry.
- Approximate number of workspace users and environments (prod / staging).
- Data categories you plan to process through Route5 (e.g. internal docs, tickets, design links).
Security & access
- Identity: how your team signs in today (e.g. SSO provider) and desired session expectations.
- Administration: who approves integrations and decision capture usage in your org.
- Incident expectations: preferred notification channel for security or availability events.
Infrastructure & data handling
- Deployment model: cloud workspace vs future VPC / dedicated region (we align on roadmap).
- Retention: how long captured artifacts should remain available in-product.
- Export & exit: whether you need scheduled exports or API access for offboarding.
Data Processing Agreement (DPA)
For customers processing personal data subject to GDPR, CCPA, or similar regimes, we provide a DPA that references our role, subprocessors, and your instructions. Start a DPA request with your company legal name and jurisdiction. We will follow up with the next step for signature.
Procurement, NET terms, and rollout
Enterprise and volume purchases can be invoiced with NET terms where credit is approved. Contact us with expected seat count, billing entity, and any vendor onboarding steps (vendor ID, W-9, or regional equivalents). We assign a single point of contact for rollout and success check-ins on larger deployments.
Custom retention, export, and VPC / BYO
Default product behavior is described in our Privacy Policy. For enterprise expectations — custom retention windows, bulk export cadence, or dedicated infrastructure — we scope these in writing after an intro call. Start a conversation.
See also Pricing for workspace limits and Terms of Service.