Security & Data Trust
Built for freight. Serious about your data.
Quelyx automates document intake without taking risks with your freight data. You stay in control of every BOL, invoice, and arrival notice — what we store, how we process it, and when it is deleted.
Every document is processed in a private, auditable pipeline.
You can delete any file at any time — and request a full account wipe whenever you want.
The six pillars of data trust at Quelyx
You own your documents
Your BOLs, invoices, and emails remain yours. You decide what to upload, how long it stays, and when it is permanently deleted.
No AI training on your data
Quelyx never uses your data to train or fine-tune AI models. AI is used only to process your documents for your account.
Built for freight sensitivity
We know your docs include rates, parties, and contract terms. Our entire workflow is designed around minimizing exposure and access.
Private, isolated environments
Each customer has logically isolated storage and data paths. For high-sensitivity cases, we offer dedicated tenant isolation.
Transparent and controllable
No black boxes. You see what’s extracted, what’s stored, and can request deletion at any time — including full account wipes.
Incident-ready and accountable
In the unlikely event of a security issue, we notify you within 72 hours with details, impact, and remediation steps.
How Quelyx handles your documents
BOLs, invoices, arrival notices — they contain customer names, values, signatures, port details, and container numbers. We treat them like financial records: only used for the job at hand, and always under your control.
- You upload a document, we extract the fields, you review them, and that’s it. No silent reuse, no training, no sharing.
- You can delete any file or request a full account wipe at any time. When it’s gone, it’s gone from our systems.
- Want to test first? Start with redacted or sample documents until your team is comfortable using live freight data.
At-a-glance: our commitments
- Data ownership
- You own all documents and extracted data.
- AI training
- Your data is never used to train or fine-tune models.
- Deletion
- Delete any document, batch, or your entire account on request.
- Isolation
- Logical isolation by default, dedicated tenant available.
- Notification
- Security incidents disclosed within 72 hours.
Need a formal DPA or security review? We’re happy to walk your ops or IT team through our practices.
Security & data FAQ
Where does our data go when we upload a document?
Your documents are stored in encrypted cloud storage inside your private Quelyx environment. Only your team and authorized Quelyx support (if you request help) can access them.
Is our data used to train AI models?
No. Quelyx does not use your data to train or fine-tune AI models. All AI processing uses enterprise-grade inference systems that do not retain or learn from your documents.
Can we delete documents or our entire account?
Yes. You can delete individual documents, batches of documents, or request a full account wipe. Deleted data is removed from storage and no longer available to Quelyx systems.
Is our data shared with other customers or third parties?
No. Your documents and extracted fields are never shared with other customers or external vendors for any purpose other than secure infrastructure hosting and AI inference.
Can we start with redacted or sample documents?
Absolutely. Many teams start by testing Quelyx on redacted or sample BOLs and invoices until they are comfortable using live production data.
What happens if there is a security incident?
In the event of a confirmed unauthorized access to your data, Quelyx will notify your team within 72 hours and provide details, remediation steps, and follow-up reporting.
Want to run a security-friendly pilot?
Start with redacted documents, an isolated tenant, or a signed DPA. We’ll meet your team where they are on the security curve.