Customer interactions are explicitly excluded from all model training processes
Enterprise security built for European regulations
GDPR compliant, EU AI Act ready, with enterprise-grade security architecture designed from the ground up.
Your data is never used for training
This is a fundamental principle of Volentis.ai: not a policy, but an architectural guarantee.
Your documents and conversations remain 100% confidential
No data is ever shared with third parties for training purposes
Contractually guaranteed in our Data Processing Agreement
Your knowledge stays yours. Period.
GDPR Compliance
Volentis.ai is designed with privacy-by-design principles and operates as a Data Processor under GDPR Article 28.
Data Processor Role
We act as Data Processor for customer content, with clear data processing boundaries and responsibilities.
Data Processing Agreement
Comprehensive DPA incorporating EU Standard Contractual Clauses available with all enterprise contracts.
Data Subject Rights
Full support for access, rectification, erasure, and portability requests.
EU AI Act Compliance
Volentis.ai is designed to comply with the EU AI Act as a limited risk system under Article 52.
Transparency Requirements
All AI-generated content is clearly labeled with mandatory transparency indicators.
AI Disclosure
Every response includes clear AI interaction disclosure and source attribution.
Human Oversight
No autonomous agent actions without human approval gates for consequential decisions.
Technical Security
Encryption
TLS 1.2+ for data in transit, AES-256 for data at rest. All communications and storage are fully encrypted.
Same encryption standards as online banking. Your data is unreadable to anyone without authorization.
Authentication
Enterprise SSO via SAML 2.0 and OpenID Connect. Multi-factor authentication supported.
Employees log in with their existing company credentials. No new passwords to remember or manage.
Role-Based Access Control (RBAC)
Granular permissions at workspace, document, and feature level. Inheritance based on department and role.
You decide exactly who sees what. That sensitive salary policy? HR only. That IT procedure? IT team only. Automatically enforced.
Audit Logging
Complete logging of all user and administrative actions. Exportable audit trails for compliance.
Every action recorded. If something goes wrong, you can trace exactly what happened, when, and by whom.
Tenant Isolation
Logical separation in multi-tenant, dedicated infrastructure in single-tenant deployments.
Your data is completely separated from other customers. No mixing, no leaks, no access by others. Guaranteed.
BYOK (Bring Your Own Key)
Bring Your Own Key encryption available for single-tenant deployments.
Maximum control: you manage the encryption keys. Even Volentis cannot access your data without your keys.
Built-in Safeguards
Volentis.ai includes important limitations by design to ensure responsible enterprise AI use.
No Automated HR Decisions
The system provides information and drafts; humans make all employment decisions.
Special Category Data Protection
No processing of health information or trade union membership without explicit configuration.
Human-in-the-Loop
No autonomous agent actions without human approval for consequential decisions.
Professional Advice Disclaimer
Not a replacement for professional legal, medical, or financial advice.
Certifications & Standards
Our commitment to industry-recognized security standards.
ISO 27001
We are actively working towards ISO 27001 certification to demonstrate our commitment to information security management.
GDPR Article 28
Operating as a certified Data Processor with comprehensive Data Processing Agreements.
EU AI Act Article 52
Classified as limited risk system with full transparency requirements implemented.
Regular Security Assessments
Annual penetration testing by independent security firms. Vulnerability scans performed quarterly. Findings addressed according to severity-based SLAs.
Security Contact
Report security vulnerabilities or questions:
security@volentis.aiNeed security documentation?
DPOs and security teams can request our full security documentation package, including DPA, technical specifications, and penetration test summaries.
Includes: DPA, Security Whitepaper, Architecture Overview, Pentest Summary
Sector-Specific Compliance Support
Volentis.ai supports compliance requirements across regulated industries.
Financial Services
Special provisions for financial services data handling and automated decision restrictions.
Healthcare
Enhanced protections for health-related data with explicit consent requirements.
Government & Public Sector
Support for government-specific data protection and transparency obligations.
Cross-Border Operations
Comprehensive support for organizations operating across EU member states.
Technical Specifications
Detailed technical specifications for your security review. We speak IT's language too.
JWT tokens (RS256 signing), 1-hour token expiry, 8-hour session timeout (configurable)Automatic logout after inactivity. Protection against forgotten open laptops
Configurable retention policies, default 12 months for audit logsYou choose how long data is kept. Meet your industry requirements, no manual cleanup needed
4 hours for metadata, 24 hours for full content refreshUpdate a document in SharePoint? The AI knows about it within hours, automatically
TLS 1.2+ for transit, AES-256 for at-rest encryptionBank-level security for all your data, whether it's being sent or stored
REST API with OAuth 2.0, rate limiting, comprehensive loggingBuild custom integrations with secure, well-documented APIs
Supported browsers for optimal platform experience:
Requires JavaScript enabled, TLS 1.2+, cookies for session management
Ready to discuss your security requirements?
Our team can provide detailed security documentation and answer your compliance questions.