User profile, session, organization, and membership information is stored to operate login, onboarding, and access control.
Privacy
This page explains the product-level privacy posture in practical terms, not legalese-heavy guesswork.
Requests can be logged with model, provider, token counts, latency, and estimated cost so teams can audit spend and usage behavior.
Organization-scoped provider keys are encrypted before storage. Environment-level provider keys can still be used as a fallback depending on deployment mode.