Security and Compliance

Practical controls, minimal retention, and clear data boundaries.

CallJune captures sales-relevant deal truth by phone and delivers structured outputs into your designated system of record. We prioritize data minimization, least-privilege access, and trusted infrastructure so teams can deploy confidently.
Contact Security
star male box icon
Your designated system of record remains
the source of truth.
plus box icon
We store limited
operational metadata only.
box click icon
Retention policies
available on request.

Our Security Pillars

locked Icon
Encryption
  • Data is encrypted in transit (TLS).
  • Data stored in managed systems is encrypted at rest using vendor-provided controls (AES-256 where supported).
  • Secure connections for destination integrations.
locked Icon
Access Control
  • Role-based access with least-privilege permissions.
  • Multi-factor authentication for internal administrative access.
  • Access reviewed and removed as roles change.
locked Icon
Data Boundaries
  • Your system of record remains the source of truth (CRM, spreadsheet, or approved destination).
  • We do not operate a parallel system of record.
  • Limited operational metadata may be stored to run the service reliably.
locked Icon
Integrations
  • Token-based, revocable integrations.
  • No end-user password storage.
  • Permissions scoped to the minimum required actions and destinations.

How data flows through CallJune

Phone Icon
Rep calls June
simple click icon
Voice processing &
 structured outcome
box click icon
Workflow
orchestration
Mobike pin icon
Destination update
(CRM, spreadsheet,
or export)
Operational metadata (limited)
  • Call ID and timestamps
  • Workflow routing state
  • Integration status
  • Audit events
box click icon
CRM Write
box click icon
Spreadsheet destination
mynaui_inbox-up-solid icon
Export-first

Security Details

1: Data flow and footprint

System of record: Your designated system of record (CRM, spreadsheet, export-first workflow, or other approved destination) remains the source of truth.
Operational metadata: CallJune may store limited operational data required to run the service (for example: call IDs, routing status, integration status, and audit events).
No parallel system: We do not operate a second system of record intended to replace yours.

2: Data retention and deletion

CallJune is designed to minimize retention by default and support customer-specific policies.
What we retain

  • Structured outputs live in your system of record.
  • CallJune may retain limited operational metadata needed to run workflows and support reliability.

Audio and transcripts

  • Retention is configurable based on customer requirements.
  • Reduced retention windows and deletion workflows can be implemented on request, subject to technical feasibility and contractual terms.
3: Access control and credential handling

Identity and access

  • Role-based access controls and least-privilege permissions.
  • MFA required for internal administrative access.
  • Access reviewed and revoked as team roles change.

Credential handling

  • Tokens and secrets stored in secure credential vaults or encrypted stores.
  • Permissions scoped to the minimum required destination actions.
  • No end-user password storage.
4: Monitoring, logging, and incident response
  • Integration activity and access events are logged for operational monitoring and troubleshooting.
  • Monitoring and alerting for service health and integration failures.
  • Documented incident response process with customer notification aligned to contractual commitments and severity.
5: Vendor security posture

CallJune relies on widely used enterprise platforms and service providers that publish security programs and make security reporting available via trust centers or under NDA, where applicable. Vendor compliance supports a strong foundation, but security is enforced through system design, least-privilege access, and data minimization.  
Commonly used categories include CRM platform (when used), voice processing, workflow orchestration, and storage for limited operational metadata.

Who can access our data internally?

Access is restricted to authorized personnel with least-privilege permissions and multi-factor authentication for administrative access.

Do you sell or monetize customer data?

No. CallJune does not sell, rent, or monetize customer data.

Do you support security questionnaires and IT reviews?

Yes. We can complete security questionnaires and provide architecture clarification. Additional details can be shared under NDA as appropriate.

Why not just use ChatGPT?

June actually uses the top LLMs like ChatGPT and Gemini—but she’s wrapped in sales intelligence, CRM awareness, voice optimization, and a real-world interface reps will actually use. You're not buying raw AI—you’re buying a sales-specific, proven system that works in the wild.

Will June work with my CRM? 

June is designed to work with the most widely used CRMs. We already integrate with Salesforce and we’re expanding support quickly. If your team uses another system, such as HubSpot, Microsoft Dynamics, or Pipedrive, June can be set up to connect through API connectors. Our goal is simple: wherever your reps keep their customer data, June can capture their voice updates and get it into the right place- without them ever touching a keyboard. (NOTE: set up may take longer for first time CRM intergrations.)

Does the coaching really work?

Companies combining AI with sales coaching see a 3.3x increase in year-over-year sales quota attainment.

How can I try June for myself?

You can call our demo June, right now at (949) 731-5466. She’ll walk you through a sales recap demo, answer questions about herself, and even send you notes afterward.

FAQ

Do you store passwords for customer systems?

No. Integrations use revocable authorization (tokens, service accounts, or API keys as appropriate). We do not store end-user passwords.

What data do you store outside our system of record?

Only limited operational metadata required to run the service reliably, such as call IDs, routing state, integration status, and audit events.

Is data encrypted?

Yes. Data is encrypted in transit (TLS). Data stored in managed systems is encrypted at rest using vendor-provided controls (AES-256 where supported).

Can we set custom retention and deletion policies?

Yes. Retention and deletion policies can be configured based on customer requirements. Reduced retention windows and deletion workflows are available on request.

If we don’t use a CRM, where does the data go?

CallJune can deliver structured outputs into the destination you approve during scoping, such as a spreadsheet destination (for example Google Sheets), an export-first CSV for customer-controlled import, or another endpoint.

Who can access our data internally?

Access is restricted to authorized personnel with least-privilege permissions and multi-factor authentication for administrative access.

Do you sell or monetize customer data?

No. CallJune does not sell, rent, or monetize customer data.

Do you support security questionnaires and IT reviews?

Yes. We can complete security questionnaires and provide architecture clarification. Additional details can be shared under NDA as appropriate.

Why not just use ChatGPT?

June actually uses the top LLMs like ChatGPT and Gemini—but she’s wrapped in sales intelligence, CRM awareness, voice optimization, and a real-world interface reps will actually use. You're not buying raw AI—you’re buying a sales-specific, proven system that works in the wild.

Will June work with my CRM? 

June is designed to work with the most widely used CRMs. We already integrate with Salesforce and we’re expanding support quickly. If your team uses another system, such as HubSpot, Microsoft Dynamics, or Pipedrive, June can be set up to connect through API connectors. Our goal is simple: wherever your reps keep their customer data, June can capture their voice updates and get it into the right place- without them ever touching a keyboard. (NOTE: set up may take longer for first time CRM intergrations.)

Does the coaching really work?

Companies combining AI with sales coaching see a 3.3x increase in year-over-year sales quota attainment.

How can I try June for myself?

You can call our demo June, right now at (949) 731-5466. She’ll walk you through a sales recap demo, answer questions about herself, and even send you notes afterward.

Have an IT review or security questionnaire?

Send it to us. We’re ready to support procurement, security reviews, and architecture questions.

Security & Compliance

Practical Controls, Clear Data Boundaries.

CallJune captures sales-relevant deal truth by phone and delivers structured outputs into your designated system of record. We prioritize data minimization, least-privilege access, and trusted infrastructure so teams can deploy confidently

Contact Security
Your designated system of record remains the source of truth.
We store limited operational metadata only
Retention policies available on request.

Our Security Pillars

Encryption

Data is encrypted in transit (TLS).
Data stored in managed systems is encrypted at rest using vendor-provided controls (AES-256 where supported).
Secure connections for destination integrations.

Access Control

Role-based access with least-privilege permissions.
Multi-factor authentication for internal administrative access.
Access reviewed and removed as roles change.

Data Boundaries

Your system of record remains the source of truth (CRM, spreadsheet, or approved destination).
We do not operate a parallel system of record.
Limited operational metadata may be stored to run the service reliably.

Integrations

Token-based, revocable integrations.
No end-user password storage.
Permissions scoped to the minimum required actions and destinations.

How data flows through CallJune

Step 1
Rep calls June
Step 2
Voice processing & structured outcome
Step 3
Workflow orchestration
Step 4
Destination update CRM, spreadsheet, or export
Metadata only
Operational metadata (limited)
Call ID and timestamps
Workflow routing state
Integration status
Audit events
CRM Write
Spreadsheet destination
Export-first

Security Details

1) Data flow and footprint

System of record: Your designated system of record (CRM, spreadsheet, export-first workflow, or other approved destination) remains the source of truth.

Operational metadata: CallJune may store limited operational data required to run the service (for example: call IDs, routing status, integration status, and audit events).

No parallel system: We do not operate a second system of record intended to replace yours.

2)  Data retention and deletion

CallJune is designed to minimize retention by default and support customer-specific policies.
What we retain

  • Structured outputs live in your system of record.
  • CallJune may retain limited operational metadata needed to run workflows and support reliability.

Audio and transcripts

  • Retention is configurable based on customer requirements.
  • Reduced retention windows and deletion workflows can be implemented on request, subject to technical feasibility and contractual terms.

3) Access control and credential handling

Identity and access

  • Role-based access controls and least-privilege permissions.
  • MFA required for internal administrative access.
  • Access reviewed and revoked as team roles change.

Credential handling

  • Tokens and secrets stored in secure credential vaults or encrypted stores.
  • Permissions scoped to the minimum required destination actions.
  • No end-user password storage.

4) Monitoring, logging, and incident response
  • Integration activity and access events are logged for operational monitoring and troubleshooting.
  • Monitoring and alerting for service health and integration failures.
  • Documented incident response process with customer notification aligned to contractual commitments and severity.

5) Vendor security posture

CallJune relies on widely used enterprise platforms and service providers that publish security programs and make security reporting available via trust centers or under NDA, where applicable. Vendor compliance supports a strong foundation, but security is enforced through system design, least-privilege access, and data minimization. Commonly used categories include CRM platform (when used), voice processing, workflow orchestration, and storage for limited operational metadata.

Frequently Asked Questions

1) Do you store passwords for customer systems?

No. Integrations use revocable authorization (tokens, service accounts, or API keys as appropriate). We do not store end-user passwords.

2)  What data do you store outside our system of record?

Only limited operational metadata required to run the service reliably, such as call IDs, routing state, integration status, and audit events.

3)Is data encrypted?

Yes. Data is encrypted in transit (TLS). Data stored in managed systems is encrypted at rest using vendor-provided controls (AES-256 where supported).

4) Can we set custom retention and deletion policies?

Yes. Retention and deletion policies can be configured based on customer requirements. Reduced retention windows and deletion workflows are available on request.

5) If we don’t use a CRM, where does the data go?

CallJune can deliver structured outputs into the destination you approve during scoping, such as a spreadsheet destination (for example Google Sheets), an export-first CSV for customer-controlled import, or another endpoint.

6) Who can access our data internally?

Access is restricted to authorized personnel with least-privilege permissions and multi-factor authentication for administrative access.

7) Do you sell or monetize customer data?

No. CallJune does not sell, rent, or monetize customer data.

8) Do you support security questionnaires and IT reviews?

Yes. We can complete security questionnaires and provide architecture clarification. Additional details can be shared under NDA as appropriate.

Have An IT Review Or Security Questionnaire?

Send it to us. We’re ready to support procurement, security reviews, and architecture questions.