Trust & Security

Trust Is Earned
Not Assumed

You trust us with your AI governance data. We take that seriously — with defense-in-depth security, rigorous access controls, and transparent practices.

How We Protect You

Security Architecture

Our security posture is built on six pillars, each designed to protect your data at every layer.

Encryption Everywhere

All data is encrypted in transit with TLS 1.3 and at rest with AES-256. Database fields containing sensitive data use additional application-layer encryption.

Infrastructure Security

Hosted on SOC2-compliant cloud infrastructure with geographic redundancy. Network segmentation, WAF, DDoS protection, and continuous monitoring.

Access Controls

Role-based access control (RBAC), multi-factor authentication, SSO/SAML support, and comprehensive audit logs for all data access.

Compliance & Audits

Regular third-party penetration testing, vulnerability assessments, and security audits. SOC2 Type II compliance program in progress.

People & Process

Background checks for all employees. Security training, incident response procedures, and responsible disclosure program.

Incident Response

24/7 security monitoring with defined incident response playbooks. Customer notification within 72 hours of confirmed data breaches.

Commitments

Our Security Promises

Clear, unambiguous commitments we make to every customer.

We never sell customer data
We never train AI models on customer data without explicit consent
We maintain separation between customer data environments
We provide data export and deletion on request
We conduct annual third-party security assessments
We maintain a responsible disclosure program
We encrypt all data in transit and at rest
We log all administrative and data access actions
Data Handling

How We Handle Your Data

We designed our data practices to minimize what we store and maximize what you control.

References, Not Raw Data

We store references and hashes — not your prompts, responses, or sensitive content. Your data stays in your systems.

Minimal Data Retention

We retain only what's needed to provide the service. Evidence metadata is kept per your configured retention policy; everything else is ephemeral.

Evidence Hashing

Every evidence pack is cryptographically hashed for integrity verification. Tamper-proof by design — auditors can verify nothing was altered.

You Own Your Data

Export or delete your data at any time. Upon account termination, all data is purged within 90 days unless legally required.

Certifications

Compliance & Certifications

SOC2 Type II

In Progress

Trust service criteria for security, availability, and confidentiality.

GDPR

Compliant

EU General Data Protection Regulation compliance.

CCPA

Compliant

California Consumer Privacy Act compliance.

HIPAA

Available

BAA available for healthcare customers on Enterprise plans.

Responsible Disclosure

If you believe you've found a security vulnerability in AILeyTech, please report it responsibly. We appreciate security researchers who help us keep our platform safe.

Report vulnerabilities to [email protected]

Trust Is Earned
Not Assumed

We're happy to answer detailed security questions, provide our security documentation, or arrange a call with our security team.