
Security & Theology Safety FAQ
🛡️ Technical Security
Your data is hosted on a secure Google Cloud infrastructure. We use robust encryption algorithms for all data both in transit (moving over networks) and at rest (stored in our databases).
We implement strict role-based access control (RBAC). Only authorized personnel with a legitimate technical need can access data, and we follow the principle of least privilege, ensuring no one has more access than their job requires.
The platform performs regular offsite backups to ensure recoverability. We also have a comprehensive disaster recovery plan with redundant systems to minimize downtime.
We require strong passwords and offer Multi-Factor Authentication (MFA). For administrators, we recommend using physical Security Keys to prevent the most advanced phishing attacks.
Yes. Our privacy controls empower individuals to clear their history at any time, ensuring their spiritual journey remains as private as they wish.
📜 Theological Safety & Integrity
The system is built on our Faith-Based AI Engine, which acts as a "conscience" for the platform. It is specifically engineered to operate within ethical and theological boundaries aligned with Biblical principles.
Absolutely. We use Ministry-Adjustable Guardrails. You can upload your specific statement of faith or core tenets, and the AI will use those as its primary "source of truth" for all generated content.
You define the boundaries. The guardrails allow you to specify exactly when an inquiry is too complex for the AI and must be referred directly to a human pastor.
While the AI uses Adaptive Learning to improve, it only does so within the guardrails you set. It becomes more attuned to your congregation's needs without ever drifting from your leadership's defined core values.
Never. Our AI agents, Grace and Levi, are designed to handle administrative logistics and intake so that your team can focus on the irreplaceable, human-to-human work of shepherding.




