Our Commitment to Security and Trust

    Learn about our comprehensive security measures and how we protect your data and privacy.

    Effective Date: January 1, 2026

    At INVSBL, we understand that trust is the foundation of our relationship with you. Your data is our top priority. We know that by using our platform, you are trusting us with your valuable information and intellectual property. This page outlines the comprehensive measures we have in place to protect your data, ensure the integrity of our systems, and build a secure and trustworthy platform.

    We are committed to maintaining the highest security standards, and to prove it, we are actively preparing for formal audits to achieve SOC 2 Type 1 and ISO 27001 certifications. These internationally recognized standards demonstrate our commitment to managing data security with a rigorous, evidence-based approach.

    Our Security Principles

    Our approach to security is built on three core principles:

    Security by Design:

    We integrate security into every stage of our product development lifecycle, from initial design to final deployment. This means we build our systems with security in mind from the ground up, not as an afterthought.

    Transparency:

    We believe in being open about our security practices. We want you to understand how your data is handled and protected, especially how our intelligent routing layer detects and shields your sensitive data.

    Continuous Improvement:

    The threat landscape is constantly evolving. We are dedicated to continuously monitoring, testing, and updating our security posture to protect against emerging threats and to meet the latest industry best practices.

    Data Handling and Privacy

    Your data is at the heart of our service, and its privacy is non-negotiable.

    Data Minimization:

    We only collect the information necessary to provide and improve our Services, as outlined in our Privacy Statement.

    Third-Party LLM Interaction:

    When you use our Services, your input is processed through our intelligent routing layer before reaching a model endpoint. This layer automatically detects private, personally identifiable (PII), and sensitive data in your prompts and ensures such information is never retained by providers or used for model training. We connect to any OpenAI-compatible model endpoint — frontier, self-hosted, or open-weight. While individual provider data-handling policies vary, INVSBL's protections ensure your confidential information stays protected regardless of which model processes your request.

    Data Retention:

    We retain your data only for as long as necessary to provide our Services and to comply with legal obligations. You can request the deletion of your account and associated data at any time.

    Security Measures in Practice

    We have implemented a robust set of technical and organizational controls to protect our platform and your data.

    1. Infrastructure & Network Security

    Cloud-Based Security:

    Our Services are hosted on a leading cloud infrastructure provider with a proven track record of security and compliance. This includes physical security controls for data centers, redundancy, and advanced network security features.

    Encryption In Transit:

    All data transmitted between your device and our Services is encrypted using industry-standard protocols, such as TLS 1.2 or higher. This prevents unauthorized interception of your data.

    Encryption At Rest:

    All your data, including User Content, is encrypted at rest using strong encryption algorithms (e.g., AES-256). Even if our physical storage were compromised, your data would remain unreadable.

    2. Access Control

    Principle of Least Privilege:

    Our employees and contractors have access to your data only on a need-to-know basis. Access is strictly controlled, logged, and reviewed regularly.

    Multi-Factor Authentication (MFA):

    We require MFA for all administrative access to our systems, adding an essential layer of security beyond a simple password.

    Secure Authentication:

    We use modern, secure authentication mechanisms to protect your account login credentials.

    3. Application & Code Security

    Secure Development Lifecycle:

    Our engineering team follows a secure software development lifecycle, including regular code reviews, to prevent common vulnerabilities and security flaws.

    Third-Party Security Audits:

    We conduct regular penetration testing and vulnerability scans with independent security experts to proactively identify and address potential weaknesses in our application.

    4. Organizational Security & Compliance

    Security Policies:

    We maintain comprehensive internal security policies that govern our operations, data handling, and employee conduct. All employees are trained on these policies and our security responsibilities.

    Incident Response Plan:

    We have a detailed Incident Response Plan in place to ensure a swift and effective response to any security incidents or data breaches. This plan outlines clear communication protocols and recovery steps.

    Compliance & Audits:

    We are actively preparing for formal audits to achieve SOC 2 Type 1 and ISO 27001 certifications. This includes implementing the necessary controls and documentation to demonstrate our commitment to security, confidentiality, availability, and integrity. These certifications will provide independent, third-party validation of our security practices.

    Your Role in Security

    While we take extensive measures to protect your data, security is a shared responsibility. We encourage you to:

    • Use a strong, unique password for your INVSBL account.
    • Enable multi-factor authentication (MFA) if and when it becomes available for user accounts.
    • Be mindful of what you input into any AI service.

    Questions?

    We welcome your questions about our security practices. For any security-related inquiries, please contact our team directly at contact@invsbl.dev.

    Questions about this policy?

    If you have any questions or concerns about this our commitment to security and trust, please contact us.

    Contact Us