AnalystEngine is built for IT leaders who operate in regulated environments. Before you upload a single file, you deserve to know precisely how your data is handled, stored, and protected at every layer.
We operate with awareness that our customers especially in financial services, healthcare, and government are themselves subject to strict regulatory obligations. Our compliance roadmap reflects theirs, not just ours. We publish our current status honestly.
| Standard | What It Covers | Relevance | Status |
|---|---|---|---|
| SOC 2 Type II | Security, availability, confidentiality & processing integrity of customer data | Required by most enterprise security teams before vendor approval | In Audit |
| ISO 27001 | International information security management standard | Globally recognized; often required by EU and multinational clients | Planned 2026 |
| GDPR | EU data protection and privacy regulation | EU-based users or data subjects; DPAs available on request | Compliant |
| CCPA | California Consumer Privacy Act | Required for California-based enterprise customers | Compliant |
| GLBA Awareness | Financial data safeguards rule | Our financial services customers are GLBA-subject; our platform is designed not to conflict with their obligations | Aligned |
| HIPAA | Health data privacy and security rules | Relevant if healthcare orgs upload patient-adjacent data | Roadmap |
| FINRA / SEC | Financial industry regulatory obligations | We don't store regulated client records; we acknowledge our customers do and design accordingly | Acknowledged |
"Private by design" means nothing without specifics. Here is the exact technical implementation from the moment a document leaves your browser to long-term storage and eventual deletion.
For a product powered by AI, the AI data policy is the most consequential section of this page. We answer every question a CISO would ask plainly, without legal hedging.
Enterprise data requires enterprise-grade access control. AnalystEngine supports the identity and access patterns that regulated organizations already use not a proprietary system you have to learn.
Your documents follow a defined, auditable lifecycle. Nothing persists longer than needed, and every stage is logged and verifiable.
Security incidents are not hypothetical. We have documented procedures for detection, containment, notification, and recovery with committed timelines, not best-effort promises.
Full transparency about every vendor that may process your data. No hidden dependencies. Changes to this list are communicated to customers 30 days in advance.
| Vendor | Purpose | Data Shared | Location | Agreement |
|---|---|---|---|---|
| Amazon Web Services | Cloud infrastructure, storage, compute | All customer data (encrypted) | US-East / US-West | DPA Signed |
| Anthropic | AI inference (Claude) | Document context, inference only | United States | Zero-Retention |
| OpenAI | AI inference (GPT-4) | Document context, inference only | United States | Zero-Retention |
| Pinecone / Weaviate | Vector database (embeddings) | Document embeddings, per-org isolated | United States | DPA Signed |
| Stripe | Payment processing | Billing data only — no document access | United States | PCI DSS |
Enterprise security reviews are a normal part of vendor onboarding. We welcome them. Reach the right team through the channel below.