Security
Your documents are sensitive. We built the platform around that fact, not as an afterthought.
Our stance
Many of our customers work in sensitive industries. Security isn't a compliance checkbox for them, so it isn't one for us. Inquisita is built with enterprise-grade security so your data stays protected.
Data handling
The most common question in a security review is “what are you going to do with our data?” Our answer is short: we process it to serve your queries, we encrypt it everywhere it lives, and we delete it when you tell us to.
Inquisita processes your documents to answer your queries and nothing else. We don't fine-tune on customer content, we don't share it with model providers for training, and we don't mine it for analytics. The only reason your documents exist in our system is so your agent can act on them.
Documents, extracted content, embeddings, and metadata are encrypted at rest with AES-256, and all connections are encrypted with TLS 1.2 or higher. Encryption keys are managed in a dedicated key-management service with automatic rotation.
Delete individual documents, entire matters, or your full account. When you delete, we delete. Documents drop from object storage, from search indexes, and from backups within the retention window required for billing records. No soft-deletes lingering in a spreadsheet somewhere.
Access & isolation
Our data storage follows industry best practices for multi-tenant isolation. We ensure that data can only be accessed by authenticated customers, and everything else of consequence is logged.
Every customer has a logically separate data space. Access is gated by authentication and tenant-scoped authorization on every request, so another customer can't see your data and our internal tooling doesn't either.
Every upload, query, analysis job, deletion, and permission change is written to an append-only audit log with actor, timestamp, and context. If something looks off in your workspace, you can reconstruct what happened without filing a support ticket.
Infrastructure
We build on hardened cloud infrastructure behind private networking, with infrastructure-as-code deployments and automated patching. Proven primitives at the base free our security investment to concentrate on the parts of the stack where customer data actually lives.
Our platform and internal processes follow SOC 2 controls: access reviews, change management, incident response, vendor reviews, and more. We're happy to share our current posture and where we are on the Type II timeline under NDA.
We only collect and store the information you ask us to. No behavioral analytics, no session replay, no profile building, no third-party trackers on our app.
We're happy to walk through our security posture, answer questionnaires, or discuss specific compliance requirements. Reach out at security@inquisita.com