Security and privacy

Privacy operates as written policy rather than as a retrofitted control.

Every outbound request is anonymized, every token is auditable, and every byte of customer data remains inside the customer-defined network boundary, because the Intelligine platform was engineered from inception for environments that are subject to external regulatory supervision.

SOC 2
Type II certified
HIPAA
Aligned
GDPR
Compliant
ISO 27001
Certified
Customer data sovereignty

Customer data never leaves the customer environment.

/01

Native virtual private cloud deployment

All processing operations are performed inside the customer Amazon Web Services, Microsoft Azure, or Google Cloud Platform virtual private cloud, with no cross-region egress permitted without explicit customer approval.

/02

On-premises and air-gapped deployment

Full deployment inside the customer-owned data center, including air-gapped configurations for sovereign defense and government environments.

/03

Per-request anonymization on egress

Outbound requests to public models have organizational identifiers, user identifiers, and personally identifying information stripped before egress, while internal routing remains fully identified for audit purposes.

/04

Token-level audit logging

Every prompt, every individual token, every tool invocation, and every routing decision is logged and is exportable in a format that the customer security information and event management platform can ingest.

/05

Encryption applied throughout

Advanced Encryption Standard with a 256-bit key length is applied to data at rest, Transport Layer Security version 1.3 is applied to data in transit, and all stored artifacts are encrypted using customer-managed key management service keys.

/06

Revocation under customer control

A single customer-issued action revokes a model, a dataset, an individual user, or an entire tenant, and cryptographic shredding of the underlying material is available on request.

Governance controls

Approved at the customer board level and defensible in front of an external regulator.

Fully traceable training pipelines from data ingestion through to weight delivery
Token-level and prompt-level auditability across every customer interaction
Explainability reports formatted for customer chief information officers and external regulators
Role-based access control coupled with organization-wide written safety rules
Prompt-level redaction of personally identifying information at run time
Data residency controls configurable per geographic region under customer policy

Engage with the Intelligine security organization.

A single call with the Intelligine security team walks the customer chief information security officer through the compliance stack, the deployment architecture, and the customer data residency requirements.