Security

Enterprise-grade security. Built in, not bolted on.

Your process data is sensitive. Every layer of Linc AI is designed around data isolation, PII protection, and zero exposure to model training.

PII Redaction Pipeline

All content passes through PII detection and redaction before reaching any AI model. Ensemble approach using NER, pattern matching, and contextual analysis.

AES-256 Encryption

Data encrypted at rest and in transit. Field-level encryption for PII columns using envelope encryption with per-organization keys rotated quarterly.

Zero Model Training

No customer content is ever used to train AI models. Contractual agreements with all AI providers prohibit retention or reuse of your data.

Multi-Tenant Isolation

Every customer's data is logically separated at every layer: database, object storage, vector database, and background workers. Cross-tenant access is architecturally impossible.

Enterprise SSO

Microsoft Entra ID, Google Workspace, and custom OIDC providers. Role-based access control with Organization Admin, Member, Viewer, and Auditor roles.

Consent-Based Capture

Employees control their own recordings. No passive surveillance. Targeted, opt-in workflow capture that addresses HR and privacy concerns upfront.

Comprehensive Audit Logs

Append-only logs for authentication, data access, analysis events, PII events, and admin actions. Exportable via UI or API.

Self-Hosted Option

Deploy into your own cloud (AWS, GCP, Azure) for full data sovereignty. All processing stays within your environment.

Infrastructure

Deployment architecture.

Infra Diagram
Firewall
VPC - Private Network
ECS Cluster
Public Subnet
App Subnet
Data Subnet
RDS Database
S3
Secrets
Logs
Multi-AZ deployment · Encrypted data · Isolated subnets · Managed secrets

To report a security concern, contact us at [email protected]

Security questions? Let's talk.

We're happy to walk through our security posture, share our SOC 2 readiness documentation, or discuss self-hosted deployment.

Contact Us