Security & Trust Center

Last Updated: April 15, 2026

At Smalt AI, security is foundational to everything we build. Our platform handles sensitive financial data and business-critical workflows, and we take that responsibility seriously. This page provides transparency into our security practices, compliance posture, and data protection measures.

Encryption at Rest & Transit SOC 2 Type II (Planned) GDPR Compliant No Training on Your Data Tenant Isolation AWS Infrastructure

1. Infrastructure Security

Cloud Infrastructure

Encryption

LayerStandardDetails
Data in TransitTLS 1.2 / 1.3All communications encrypted via HTTPS. HSTS enforced.
Data at RestAES-256All stored data encrypted using AWS KMS-managed keys.
DatabaseAES-256Encrypted at the storage layer with automated key rotation.
BackupsAES-256All backups encrypted with separate encryption keys.

2. Application Security

Authentication & Access Control

Secure Development Practices

3. Data Protection

Your Data Principles

PrincipleOur Commitment
Ownership You own your data. We never claim ownership of your inputs or outputs.
No Model Training We do NOT use your data to train, fine-tune, or improve any AI models. Your financial data stays your financial data.
Tenant Isolation Each customer's data is logically isolated. No cross-tenant access is possible.
Data Minimisation We collect only what is necessary to provide the Service.
Right to Delete You can delete your data at any time. Upon account termination, data is deleted within 30 days.
Data Portability Export your data in standard formats at any time.

AI Data Flow

When you use Smalt AI, here is how your data flows:

  1. Input: Your query or document is sent over TLS-encrypted connection to our servers.
  2. Processing: We construct a prompt and send it to our LLM provider (Anthropic or Google) via their enterprise API with data processing agreements in place.
  3. No Retention by LLM Providers: Our agreements with LLM providers ensure they do not retain your data or use it for training.
  4. Output: The response is returned to you and stored in your conversation history (which you control).
  5. Logging: We log metadata (timestamps, token counts) for billing and monitoring. We do not log the content of your queries or outputs.

4. Compliance

FrameworkStatusDetails
GDPR Compliant Full compliance with EU General Data Protection Regulation. DPA available on request.
UK Data Protection Act 2018 Compliant Compliant with UK GDPR and Data Protection Act 2018.
CCPA / CPRA Compliant California Consumer Privacy Act compliance for US customers.
SOC 2 Type II Planned 2026 Audit planned. Security controls aligned with SOC 2 Trust Service Criteria.
ISO 27001 On Roadmap Information security management system certification on our compliance roadmap.

5. Incident Response

6. Business Continuity

7. Vendor Security

We carefully evaluate all third-party vendors and sub-processors:

8. Responsible Disclosure

We welcome responsible security research. If you discover a vulnerability:

Report vulnerabilities to: support@smaltai.com

9. Security FAQs for Enterprise Buyers

Q: Where is my data stored?
A: Your data is stored on AWS infrastructure. We can discuss specific region requirements for enterprise deployments.

Q: Do you use my data to train AI models?
A: No. We have explicit agreements with our LLM providers (Anthropic, Google) that prohibit the use of customer data for model training.

Q: Can I get a copy of your SOC 2 report?
A: Our SOC 2 Type II audit is planned for 2026. In the interim, we can provide our security questionnaire responses and a detailed overview of our controls.

Q: Do you offer self-hosted / on-premise deployment?
A: Enterprise customers can discuss deployment options. Contact support@smaltai.com for details.

Q: Can I sign a DPA?
A: Yes. Our standard DPA is available for download, and we can accommodate custom DPA requirements for enterprise customers.

10. Contact

Security Team: support@smaltai.com
Privacy Team: support@smaltai.com
Enterprise Sales: support@smaltai.com