Security Pillar
Authenticated workspace boundaries
Protected actions and saved workspace state run under authenticated user context so connected records remain scoped to the signed-in account.
Security
theCREmodel keeps the public experience clean while preserving authenticated workspace boundaries, cross-device cloud persistence, and a single connected security model across documents, analytics, CRM, marketing flyers, abstracts, and obligations.
Security Pillar
Protected actions and saved workspace state run under authenticated user context so connected records remain scoped to the signed-in account.
Security Pillar
Signed-in users can update their account name, email, and password from Personal Info while changes continue through the authenticated Supabase user endpoint.
Security Pillar
Documents, analyses, CRM records, marketing flyers, lease abstracts, and obligations stay tied to the same workspace graph without leaking across users or clients.
Security Pillar
New CRM client, tenant, and prospect profiles create linked pipeline deals, stay available in CRM selectors and account client settings, and use controlled stage changes to keep profile status aligned with pipeline movement.
Security Pillar
Each client logo is stored once under that client workspace and reused across presentation outputs so branding changes do not fork into mismatched copies.
Security Pillar
Signed-in workspace state is persisted in cloud-backed storage and can be restored from any device without silently reviving stale or deleted records.
Security Pillar
When a saved source document is deleted, linked obligation repository records are pruned with it so removed lease files do not keep stale deadline records alive.
Security Pillar
Original file payloads and parsed document snapshots sync separately from the main workspace record so Open and Apply can work on another signed-in device without relying on browser-only file caches.
Security Pillar
Signed-in devices keep their workspace session for up to 30 days of use unless the user signs out, while backend requests still require authenticated tokens.
Security Pillar
The footer keeps sync visibility compact with Online, Sign in to sync, and Local states so users can confirm whether the workspace is cloud-connected before switching devices.
Security Pillar
OCR-heavy and image-only documents use bounded intake behavior so extraction remains responsive while still protecting the broader workflow and downstream exports.
Security Pillar
Notice, renewal, and termination dates pulled from lease rights clauses stay attached to the client-scoped obligation record and saved document snapshot so teams can review deadlines before relying on the timeline.
Security Pillar
Marketing flyers and lease abstract exports preserve analyst review status and source-document context so client-ready packages do not silently hide unresolved extraction issues.
Security Pillar
Subscription payments are processed entirely through Stripe — card data never touches our servers. Plan limits are enforced server-side via authenticated API calls so UI-only workarounds cannot bypass feature gates.
Security Pillar
Every feature gate (deal limits, PDF export quotas, AI extraction access, module visibility) is validated on the backend against the org's verified subscription status. Downgraded or expired accounts revert to Starter limits automatically.
Security Pillar
Stripe billing events are verified using signed webhook payloads before updating plan status. This prevents spoofed upgrade events from granting unauthorized access.
Security Pillar
Generated lease and sublease flyers use account branding and client-scoped marketing settings instead of hardcoded brokerage identity. Extracted flyer photos, floorplans, broker defaults, and generated PDFs stay scoped to the active workflow, share link, or saved client workspace record only after the user explicitly saves the PDF.
Security Pillar
Production traffic is served from thecremodel.com so public pages, authenticated pages, and support flows stay aligned on the same origin.
Security Pillar
Security questions and operational issues flow through the same monitored support channel so reports can be triaged quickly with workspace context.
Tenant Rep
Tenant mode changes workflow emphasis and reminders only; shared security and data boundaries stay intact.
Landlord Rep
Landlord mode changes leasing-console behavior and reporting emphasis only; shared security and client boundaries remain unchanged.
Report A Concern
Email info@thecremodel.com for security questions, suspicious behavior, or vulnerability reports.
Include the workspace or client name, the page involved, the action you took, and any timestamps or screenshots that will help reproduce the issue quickly.