Your customer data is
not our training data.

You're trusting us with sensitive customer conversations. We built RiskDetect with the assumption that security is the price of entry, not a premium feature.

What we do with your data. And what we don't.

Encryption at every layer

All data is encrypted both in transit and at rest. No exceptions.

TLS 1.3 for all API communication
AES-256 encryption for stored data
API keys hashed with bcrypt

Complete tenant isolation

Every organization's data lives in its own isolated partition. There is no mechanism for cross-tenant data access.

Row-level security on every query
Scoped API keys per organization
No shared data stores between tenants

Zero training on your data

We will never use your customer conversations, risk assessments, or any derived data to train AI models. Period.

Analysis uses API calls, not fine-tuning
No data retention by AI providers
You can request full data deletion anytime

Access control and audit logging

Every API request is authenticated, authorized, and logged. Full audit trail for compliance.

Role-based access control (RBAC)
Immutable audit logs on every action
IP allowlisting available on Scale plan

What happens to your data, step by step.

1

You send customer text

Via API, email forwarding, or the Salesforce trigger. Encrypted in transit with TLS 1.3.

2

AI analyzes the content

Sent to the AI model via their enterprise API (zero data retention agreement). The model scores risk and returns signals. No fine-tuning, no storage on their end.

3

Results stored in your partition

Risk score, signals, and recommended actions are saved to your isolated tenant. Original text is stored encrypted and only accessible to your team.

4

Retention follows your plan

Starter: 7 days. Growth: 90 days. Scale: unlimited. After your retention window, data is permanently deleted. You can request early deletion anytime.

5

Account deletion is complete

When you cancel, all data is retained for 30 days (in case you change your mind), then permanently purged from all systems including backups.

Security isn't a feature. It's a requirement.

SOC 2 Architecture

Built on infrastructure that meets SOC 2 Type II requirements. Monitoring, alerting, and incident response procedures in place.

99.9% Uptime SLA

Scale plan customers get a contractual uptime guarantee. All plans benefit from redundant infrastructure and automatic failover.

Responsible Disclosure

We maintain a security contact for vulnerability reports. Verified issues are patched within 48 hours and reporters are credited.

Questions about our security practices?

We're happy to walk through our security architecture on a call. Or just email security@riskdetect.app.