Skip to main content

QuietOffer Security Whitepaper

Details on QuietOffer's security and data practices.

Updated over 5 months ago

At QuietOffer, we take the security and confidentiality of commercial real estate data seriously. Our platform enables brokers and institutional buyers to exchange sensitive documents such as offering memoranda, income statements, rent rolls, and financial reports. We’ve implemented strong safeguards across infrastructure, access controls, and document workflows — and are committed to maintaining industry best practices for security and privacy.


1. Infrastructure & Hosting

  • QuietOffer is built on PostgreSQL for structured data and secure object storage for files.

  • Data and files are hosted on infrastructure with built-in security and redundancy.

  • All data is encrypted at rest and in transit.


2. Authentication & Access Controls

  • Users sign in via secure Google and LinkedIn Authentication.

  • All data is protected using Row-Level Security. (RLS)

    • Listings and documents are accessible only by the broker or team who created them.


3. Document Upload, Protection & Watermarking

  • Brokers can upload documents such as:

    • Offering memoranda

    • Income and expense statements

    • Lease agreements or rent rolls

    • Sales comps and due diligence materials

  • Uploaded documents are stored securely using private buckets.

  • All document downloads are watermarked with the viewer’s email or user ID and logged for auditing.

  • Only users with explicit access can view or download documents.


4. Confidentiality & Deal Visibility

  • Listings on QuietOffer are private by default and do not appear on public search engines or listing sites.

  • Brokers control who sees their listings and who can request access to view supporting documents.

  • QuietOffer does not share user-uploaded materials with third parties without permission.


5. Logging & Monitoring

  • All sensitive actions — logins, uploads, downloads, document views, and listing activity — are logged and time-stamped.

  • Audit logs are monitored to detect unusual behavior or unauthorized access.

  • Internal tools allow for administrative oversight when required.


6. Permissions & Platform Controls

  • Brokers maintain full control over their listings and data.

  • Admin tools allow internal staff to assist users while respecting confidentiality.

  • QuietOffer follows the principle of least privilege across systems and workflows.


7. Development & Code Practices

  • Code is version-controlled and peer-reviewed.

  • Production credentials and secrets are securely managed outside of the codebase.

  • Deployment environments are separated and access is limited to core engineering staff.


8. Security Standards & Commitment

QuietOffer is actively aligning with industry-standard security frameworks such as SOC 2. While not currently certified, our platform architecture and internal practices are designed with those standards in mind. We continuously evaluate our infrastructure, update controls, and apply best practices to ensure data confidentiality, integrity, and availability.


9. Security Contact

We welcome responsible disclosure and security-related inquiries. Please contact our team at:

  • For questions from institutional partners or enterprise clients

  • To report suspicious activity or vulnerabilities

  • To request additional documentation under NDA


10. Summary

QuietOffer is designed to protect sensitive commercial real estate information from unauthorized access or misuse. Our security model combines encryption, document watermarking, row-level access controls, and audit logging — giving brokers and buyers peace of mind when conducting off-market transactions. As we grow, we remain committed to maintaining a strong security posture and building trust with every user on our platform.

Did this answer your question?