Enterprise-Grade Security for the Documents That Matter Most
Every design decision in Inkscribe AI Enterprise starts with security. From architecture to access controls to compliance certifications — we protect your most sensitive documents with the same rigor you'd expect from the world's top financial institutions.
Compliance Certifications
Our compliance posture is maintained through continuous monitoring, annual third-party audits, and dedicated security operations.
SOC 2 Type II
Independently audited by a certified CPA firm. Our controls for security, availability, processing integrity, confidentiality, and privacy are verified annually.
Learn More →GDPR Compliant
Full compliance with EU General Data Protection Regulation. Right to access, rectify, erase, and port your data. DPA available on request.
Learn More →HIPAA Ready
Administrative, physical, and technical safeguards for Protected Health Information (PHI). BAA available for healthcare organizations.
Learn More →ISO 27001
Information security management system certified. Comprehensive risk management and security controls across all operations.
Learn More →Zero-Trust Security Architecture
We assume every request is potentially hostile — from inside and outside the network. Every access, every action, every API call is authenticated, authorized, and logged.
Security Features by Category
Access Control
- Single Sign-On (SAML 2.0, OKTA, Auth0)
- Multi-Factor Authentication (TOTP, SMS)
- Role-Based Access Control (6-tier: Owner → Viewer)
- Department and team-level permission inheritance
- Document-level and folder-level access controls
- Guest access with time-limited permissions + auto expiry
- IP allowlisting (Supreme)
- Session management with device tracking
- Session revocation capability
Data Security
- TLS 1.3 encryption for all data in transit
- AES-256 encryption for all data at rest
- Workspace-level data isolation (no cross-contamination)
- Encrypted backup storage with point-in-time recovery
- Secure file deletion (NIST 800-88 compliant)
- API key encryption (AES-256)
- Field-level encryption for sensitive metadata
Compliance & Audit
- Comprehensive audit trail for every user action
- Immutable audit logs (tamper-evident)
- GDPR data export and deletion workflows
- HIPAA Business Associate Agreement (BAA) available
- Data residency options (US, EU, custom — Supreme)
- DLP policy enforcement
- Compliance reporting dashboards
Infrastructure
- Multi-region cloud deployment
- 99.9% uptime SLA (custom SLAs available on Supreme)
- Auto-failover and disaster recovery
- Regular penetration testing by third-party firm
- Vulnerability disclosure program
- Security patches within 24 hours of critical CVEs
What Happens to Your Documents
Your Data Is Yours
We never train any AI model on your documents. Your content is never used to improve our systems without explicit written consent.
Retention & Deletion
Documents are retained per your configured retention policy. Deletion requests are executed within 72 hours, with certificate of deletion available on request (Supreme).
No Third-Party Data Sharing
We do not sell, share, or transfer your document data to any third party for any commercial purpose.
On-Premise & Private Cloud Options
For organizations that cannot use shared cloud infrastructure — government agencies, defense contractors, highly regulated financial institutions — Inkscribe AI Enterprise Supreme offers full on-premise and private cloud deployment with the same feature set as our cloud offering.
Cloud (SaaS)
- Multi-region deployment
- Auto-scaling infrastructure
- Fully managed by Inkscribe
- 99.9% uptime SLA
- Available on all plans
Private Cloud
- Deploy in your AWS, Azure, or GCP tenancy
- Your data never leaves your cloud account
- Managed updates and patching
- Custom network configuration
- Dedicated support team
On-Premise
- Full deployment behind your firewall
- Air-gapped options available
- Complete data sovereignty
- Hardware security module (HSM) support
- Dedicated implementation team
Trust Center Resources
Documentation your security and procurement teams need.
Security Whitepaper
Comprehensive overview of our security architecture, practices, and certifications.
Download PDFSOC 2 Report
Full SOC 2 Type II audit report from our certified CPA firm.
Available under NDAGDPR Data Processing Agreement
Standard DPA for organizations processing EU citizen data.
Download DPAPenetration Test Summary
Executive summary of our latest third-party penetration test.
Available under NDASecurity Questions? Talk to Our Team.
Our security architects are available for pre-sales security reviews. We'll walk through your specific requirements, answer detailed technical questions, and provide any documentation your procurement team needs.