Security isn’t a checkbox for MortonApps LLC — every Morton Command Center deployment touches your tenants’ ticket data, billing records, and security alerts. The platform is designed around three principles: your data stays in your tools, least-privilege access by default, and edge-deployed infrastructure with no warehouse to breach.

This page summarizes the technical and operational controls we use. For per-customer specifics, our Data Processing Addendum (DPA) and Master Services Agreement (MSA) accompany every engagement.

Architecture & data residency

Morton Command Center is built on Cloudflare’s global edge network. Each customer instance is deployed as an isolated Cloudflare Pages project with its own dedicated KV namespace, R2 bucket, and Workers — there is no shared multi-tenant database. Your customizations, settings, and cache live only in the resources scoped to your deployment.

Your business data stays in your tools. Command Center reads from your existing PSA, RMM, accounting system, and security stack via API and renders unified views. We do not warehouse a primary copy of your data. If you ever stop using Command Center, your historical records remain exactly where they always lived.

Encryption

Authentication & access control

Audit logging

Every administrative action — sign-in, role change, configuration update, integration connect/disconnect, ticket modification — is recorded to a tenant-scoped audit log. Logs are retained for at least 30 days and made available to Administrators through the dashboard. Customers can request longer retention or export under their MSA.

Infrastructure security

Vendor & subprocessor management

We use a deliberately small set of carefully chosen subprocessors. The current list, scope, and locations are published in our Privacy Policy. Notable certifications:

Material changes affecting customer data processing trigger advance notice in accordance with the DPA.

Software development lifecycle

Incident response

If we detect or are notified of a security incident affecting customer data, we will:

  1. Contain and investigate the incident promptly
  2. Notify affected customers without undue delay (and within timelines required by applicable law and the DPA)
  3. Provide a written post-incident summary describing the cause, impact, and remediation
  4. Implement corrective measures to reduce the risk of recurrence

Customers can report a suspected vulnerability or incident at any time to [email protected].

Responsible disclosure

We welcome reports from security researchers. If you believe you’ve found a vulnerability in Morton Command Center or the website, please email [email protected] with the details and a way to reproduce. We commit to:

Compliance posture

Morton Command Center inherits compliance certifications from its underlying platform providers (Cloudflare, Clerk, AWS — all SOC 2 Type II at minimum). Direct certification of MortonApps as an organization is on our roadmap as we scale; in the interim, we contractually align to SOC 2 control objectives and can support customer-led security questionnaires.

For customers in regulated industries (healthcare, financial services), the DPA addresses the relevant legal frameworks. We can sign Business Associate Agreements (BAAs) for HIPAA-covered customers on a case-by-case basis.

Customer responsibilities

Security is a shared responsibility. Your part includes:

Questions or due diligence

For prospective customers conducting security due diligence — including completing a security questionnaire, reviewing our DPA, or arranging a call with our team — please email [email protected].