Trust & Security
Last updated: March 2026
HAIEC is a tool that helps your organisation demonstrate AI governance. This page explains how we handle data, what infrastructure we use, and where our own security posture stands — honestly.
The most important thing to know
HAIEC does not require access to your production data, user data, or sensitive business data to perform analysis. Our static scanner reads source code structure and configuration. Our runtime engine sends pre-defined, safe attack simulations to your test endpoints. Analysis results — findings, scores, and evidence hashes — are what we store. Not your source code, not your users' data.
1. Data Handling
What we store
- Scan metadata: scan ID, repository URL, branch, status, finding counts, timestamps.
- Finding records: file path, line range, rule ID, severity, description. No source code content.
- Evidence hashes: SHA-256 content hashes for tamper detection. Not the underlying content.
- Assessment responses: your answers to compliance wizard questions, stored per your account.
- Account data: name, email, organisation name, subscription tier.
- NYC LL144 candidate identifiers: hashed using SHA-256 before storage. Raw PII is not retained.
What we do not store
- Source code content. Code is analysed in-memory during a scan and discarded.
- Your GitHub repository files. The GitHub App collects metadata only (branch protection status, file presence checks).
- Runtime test target responses beyond pass/fail outcome and extracted finding context.
- Payment card data. Payments processed entirely by Stripe (PCI DSS Level 1).
Do we process PII?
For most customers: no. The platform operates on code structure and configuration. For NYC LL144 bias audit customers, candidate identifiers are processed but are hashed before any storage. We do not retain raw candidate PII.
Is analysis transient?
Yes. The scan engine processes your repository in an ephemeral Modal container. The container is torn down after the scan completes. Only the structured finding output is returned and persisted — not the code that was analysed.
Data retention
- Scan results: retained until you delete them or your account is closed.
- Assessment data: retained until you delete the assessment.
- Account data: deleted within 30 days of account closure on request.
- Audit logs: retained for 7 years per compliance record-keeping norms.
2. Deployment Options
Cloud (current)
Hosted on Vercel + Neon + Modal. US region. No setup required.
Self-hosted (future roadmap)
We are exploring a self-hosted scanner option for organisations that require data to remain within their own perimeter. Not available yet. Contact us if this is a requirement.
3. Infrastructure
We leverage SOC 2–compliant infrastructure providers. HAIEC itself has not yet completed a SOC 2 Type II audit. We are working toward this.
| Provider | Role | Certification |
|---|---|---|
| Vercel | Application hosting & edge network | SOC 2 Type II |
| Neon | PostgreSQL database (serverless) | SOC 2 Type II |
| Modal | Scan execution compute (ephemeral containers) | SOC 2 Type II |
| Stripe | Payment processing | PCI DSS Level 1 |
| Resend | Transactional email | SOC 2 Type II |
| GitHub | Source integration & App platform | SOC 2 Type II |
| Sentry | Error monitoring | SOC 2 Type II |
| Upstash | Redis — rate limiting & caching | SOC 2 Type II |
Full list with data processing details: Subprocessor List
4. Access & Security Controls
Encryption
- In transit: TLS 1.2+ enforced on all connections
- At rest: AES-256 (Neon database)
- Evidence integrity: SHA-256 content hashing
- HTTPS-only; HTTP requests redirected
Access control
- OAuth 2.0 via GitHub / Google (NextAuth)
- All DB queries scoped to authenticated user ID
- API keys: HMAC-signed, rotatable, audit-logged
- GitHub App: installation-scoped, minimum permissions
- Tenant isolation enforced at query level
Logging
- Every scan logged with user ID, repo, branch, timestamps
- Evidence records include collection timestamp and rule version
- All API key authentications logged
- Webhook deliveries logged with delivery ID and outcome
- Error monitoring via Sentry
Hardening
- Zod schema validation on all API inputs
- Parameterised queries via Prisma ORM (no raw SQL)
- CSRF protection on all form submissions
- Content Security Policy headers via middleware
- Rate limiting: Redis-backed, fail-closed
5. Our Certification Posture (Honest)
SOC 2 Type II: Not yet completed. Our infrastructure providers are SOC 2 Type II certified. We are building toward our own audit. We will not claim SOC 2 certification until an independent auditor issues the report.
ISO 27001: Not certified. Controls are designed with ISO 27001 principles in mind.
GDPR: We maintain data processing records (Article 30), support deletion requests, and our architecture minimises personal data collection. We are not claiming GDPR "certification" (no such certification exists) — we are describing design alignment.
Penetration testing: Not yet completed by a third-party firm. Customers requiring a penetration test report should contact us.
Related documents
Security questions or enterprise due diligence? security@haiec.com or contact us.