Intelligine Technologies logo
Live monitoring by Delve
Intelligine Technologies Compliance Report
Intelligine Technologies is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Ctrl+K

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IPending

SOC 2 Type I

Audited controls for security, availability, and confidentiality trust service principles.

HIPAAPending

HIPAA

US regulation that safeguards medical data privacy and security. Essential for healthcare providers, insurers, and related tech.

Continuously monitored
GDPRPending

GDPR

EU regulation that governs personal data protection and privacy for individuals within the EU. Applies globally to anyone handling EU data.

Continuously monitored

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

HIPAA Internal Privacy Policy

HIPAA Internal Privacy Policy document

Updated: December 2025
PDF

Age Verification and Parental Consent Policy

Age Verification and Parental Consent Policy document

Updated: December 2025
PDF

Personnel Security Policy

Personnel Security Policy document

Updated: December 2025
PDF

Acceptable Use Policy

Acceptable Use Policy document

Updated: December 2025
PDF

Data Protection, Accountability, and Privacy by Design Policy

Data Protection, Accountability, and Privacy by Design Policy document

Updated: December 2025
PDF

Information Security Policy

Information Security Policy document

Updated: December 2025

Security controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Alerts and Remediation
Completed
Board Charter
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed
Alerts and Remediation
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Anonymization/​pseudonymization Process Documentation
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed
Criminal Data Processing Policy
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed
Asset Register List
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Alerts and Remediation
Completed
Board Charter
Completed
Board Meeting Minutes
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Access Review of Infrastructure
Completed
Alerts and Remediation
Completed

Compliance with Regulations & Standards

LIVE
Age Verification and Parental/​guardian Consent Process
Completed
Anonymization/​pseudonymization Process Documentation
Completed
Appointment Agreement for EU Representative
Completed

Data Protection & Privacy

LIVE
Access Control Procedures
Completed
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Anonymization/​pseudonymization Process Documentation
Completed

Governance & Oversight

LIVE
Anonymization/​pseudonymization Process Documentation
Completed
Background Checks
Completed
Cooperation Agreements/​data Sharing Frameworks
Completed
Criminal Data Processing Policy
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Disposal Procedure
Completed
Asset Register List
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Alerts and Remediation
Completed
Board Charter
Completed
Board Meeting Minutes
Completed
Showing 6 of 8 control categories

Subprocessors directory

We carefully select and monitor all third-party services that process data on our behalf.

Slack logo

Slack

Business Apps & Productivity

Pinecone logo

Pinecone

Data Stores & Warehouses

Azure logo

Azure

Cloud Infrastructure & Platform Services

OpenAI logo

OpenAI

AI & ML Services

AWS logo

AWS

Cloud Infrastructure & Platform Services

Anthropic logo

Anthropic

AI & ML Services

Showing 6 of 7 subprocessors

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Intelligine, security is not a feature. It is the foundation of our architecture, our culture, and every product decision we make. We were built on a simple belief that your intelligence should belong to you, and protecting that intelligence is our highest responsibility. From day one, we designed Intelligine as a private AI operating system that runs inside your infrastructure, ensuring your data, models, and memory never leave your control. Our privacy-first mindset guides our engineering practices, infrastructure design, deployment models, and organizational policies. We safeguard every interaction with the highest standards of security and governance with: - Zero data retention as we never store your prompts, files, conversations, or outputs. Nothing is retained or logged outside your environment. - Zero training on customer data: No customer data is ever used to train or fine-tune third-party models. Your intelligence stays yours — always. - Full anonymization pipeline: Every request is anonymized, tokenized, and stripped of identifying information before reaching any external model provider. - Your environment, your rules: Intelligine is deployed in your VPC, your cloud account, or on-prem. All model routing, processing, and agent execution occur inside your controlled environment. - True data sovereignty: Your organization retains full ownership of all data, embeddings, workflows, custom models, and outputs created within Intelligine. - Enterprise-grade governance: We support SSO, RBAC, audit logs, encryption in transit and at rest, policy enforcement, and region-specific deployments to align with SOC2, HIPAA, and GDPR frameworks. - Private model orchestration: Our patent-pending orchestration engine evaluates each query, selects the optimal models, and performs all routing securely under your governance. - Custom models are fully yours: Any custom AI model trained through Intelligine (including weights and configurations) is fully owned by your organization and never exposed to third parties without explicit written permission. - Least-privilege access & operational isolation: We maintain strict internal access controls, code isolation, and operational boundaries to ensure your environment remains private, insulated, and protected. We treat every dataset, every interaction, and every model entrusted to Intelligine with the utmost care, transparency, and responsibility. Security is embedded in our DNA, guiding our mission to deliver powerful AI capabilities without ever compromising your protection, privacy, or sovereignty. This is our commitment: Intelligine will always protect, respect, and empower your intelligence — because your data, your models, and your memory should remain yours.

Privacy Policy|Terms of Service
Monitored byDelve Logo
Security Shield