Trust · Security

How we handle your data.

A short, honest summary of how Evidynt stores, processes, and protects the data we work with on your behalf. The full version is being locked down with our infrastructure team.

Infrastructure

US-based, modern stack.

Hosted on tier-one cloud infrastructure with full encryption at rest and in transit. Standard managed-database posture, daily backups, region isolation.

Access

Least-privilege, by default.

SSO for the team. Role-based access in the dashboard. Audit log of every internal data access. Founder-only access to production keys.

Models

No training on your data.

Your conversations and training corpus are yours. We do not feed them into shared models, and we contractually disable training with our model providers.

Exit

Portability is non-negotiable.

If you decide to leave, you get a clean export of every conversation, every record, and every event. We delete on request, on a defined schedule.

Where this page is going

Full security documentation, soon.

SOC 2 Type II is on the roadmap. We will publish a full security overview, sub-processor list, DPA template, and our incident response posture.