Home Compliance Pricing Privacy Login

Security & Compliance

How Veristrom protects your data and supports your regulatory requirements.

🇪🇺

GDPR

Data minimization and consent-based processing

🔒

SOC 2

Auditability and access controls

🏥

HIPAA

PHI awareness and aligned workflows

🆘

CCPA

Consumer data rights and transparency

Regulatory Alignment

Veristrom is designed to help organizations align with key regulatory frameworks:

RegulationHow Veristrom Supports Compliance
GDPRClient-side PII detection enforces data minimization. User consent workflow ensures no personal data is transmitted without explicit approval. Users can delete their account and all associated data.
CCPAUsers have full visibility into what data is being processed. Account deletion removes all stored data. No data is sold or shared for advertising purposes.
HIPAAPHI detection rules identify health-related PII before it reaches AI models. Client-side scanning ensures PHI never leaves the browser without user approval. Enterprise tier supports BAA requirements.
SOC 2Cloud infrastructure provides the foundation for SOC 2 alignment. Access controls, audit logging, and encryption support Trust Services Criteria.
Veristrom is not currently SOC 2 certified or HIPAA certified. The platform is designed with these frameworks in mind and supports organizations in meeting their own compliance obligations. Enterprise customers requiring formal certifications should contact [email protected].

Data Protection

All data is encrypted at rest and in transit. User chat messages, AI responses, and uploaded files are stored in fully managed, encrypted cloud databases and storage. All API communication uses TLS 1.2+.

LayerProtection
Data at restAES-256 server-side encryption for all databases and file storage
Data in transitTLS 1.2+ for all API and CDN traffic
File uploadsEncrypted cloud storage with per-user key isolation
Sensitive fieldsApplication-level encryption using per-user encryption keys backed by hardware security modules

Each user's files are stored in isolated storage paths. File metadata (names, types) is encrypted at the application level using per-user encryption keys, ensuring that even internal access to the database does not expose file names.

Infrastructure

Veristrom runs entirely on enterprise-grade cloud infrastructure hosted in US-based data centers.

ComponentCapability
ComputeServerless architecture — no persistent servers to patch or maintain
API layerManaged API gateway with rate limiting and throttling
DatabaseFully managed, encrypted database
File storageEncrypted private cloud storage with access controls
Key managementHardware security module-backed key management service
CDNEnterprise CDN with DDoS protection (static assets only)

The serverless architecture means there are no persistent servers to patch or maintain. Each API request runs in an isolated execution environment that is destroyed after use.

PII Detection & Client-Side Scanning

Veristrom's core privacy feature is its client-side PII detection engine. Before any user message or file is sent to an AI model, the content is scanned locally in the user's browser for sensitive information.

Key principle: Veristrom does not read, log, or store the content of PII detections. The detection engine runs entirely in the user's browser. The server only receives the message after the user has reviewed and approved it.

Access Controls & Authentication

Data Isolation

Veristrom uses a customer data silo approach. Each user's data is logically isolated:

AI Model Data Handling

Veristrom connects to third-party AI models via their enterprise-grade APIs. Important data handling details:

Veristrom acts as a protective layer between users and AI models. We do not control the data handling policies of third-party AI providers. Users should review each provider's terms of service and data processing agreements for their specific compliance needs.

Security Practices

Questions?

For security inquiries, compliance documentation requests, or to discuss Enterprise requirements, contact us at [email protected].