Intelligine Technologies logoIntelligine Technologies

Intelligine Technologies Trust Center

At Intelligine, security is not a feature. It is the foundation of our architecture, our culture, and every product decision we make. We were built on a simple belief that your intelligence should belong to you, and protecting that intelligence is our highest responsibility. From day one, we designed Intelligine as a private AI operating system that runs inside your infrastructure, ensuring your data, models, and memory never leave your control. Our privacy-first mindset guides our engineering practices, infrastructure design, deployment models, and organizational policies. We safeguard every interaction with the highest standards of security and governance with: - Zero data retention as we never store your prompts, files, conversations, or outputs. Nothing is retained or logged outside your environment. - Zero training on customer data: No customer data is ever used to train or fine-tune third-party models. Your intelligence stays yours — always. - Full anonymization pipeline: Every request is anonymized, tokenized, and stripped of identifying information before reaching any external model provider. - Your environment, your rules: Intelligine is deployed in your VPC, your cloud account, or on-prem. All model routing, processing, and agent execution occur inside your controlled environment. - True data sovereignty: Your organization retains full ownership of all data, embeddings, workflows, custom models, and outputs created within Intelligine. - Enterprise-grade governance: We support SSO, RBAC, audit logs, encryption in transit and at rest, policy enforcement, and region-specific deployments to align with SOC2, HIPAA, and GDPR frameworks. - Private model orchestration: Our patent-pending orchestration engine evaluates each query, selects the optimal models, and performs all routing securely under your governance. - Custom models are fully yours: Any custom AI model trained through Intelligine (including weights and configurations) is fully owned by your organization and never exposed to third parties without explicit written permission. - Least-privilege access & operational isolation: We maintain strict internal access controls, code isolation, and operational boundaries to ensure your environment remains private, insulated, and protected. We treat every dataset, every interaction, and every model entrusted to Intelligine with the utmost care, transparency, and responsibility. Security is embedded in our DNA, guiding our mission to deliver powerful AI capabilities without ever compromising your protection, privacy, or sovereignty. This is our commitment: Intelligine will always protect, respect, and empower your intelligence — because your data, your models, and your memory should remain yours.

Compliance

Resources

Baseline Hardening Policy
Business Continuity and Disaster Recovery
Vendor Management Policy
Board of Directors Charter
Automated individual decision-making, including profiling

Controls

ePHI policy accessibility evidence
Access restricted to modify infrastructure
Remote access tool
Access control procedures
Access review of infrastructure
Encryption of data
Privacy and confidentiality governance charter
Data protection policy
Data transfers covered by approved safeguards
Cooperation agreements/data sharing frameworks
Source code tool
Vulnerability scanning
Business continuity and disaster recovery testing
Web application firewall
Sample code changes
SSL/TLS certificates for infrastructure
Intrusion detection tool
Infrastructure baseline hardening policy
Monitoring tool
Infrastructure firewall
Security incident list
Alerts and remediation
Incident response and breach notification policy
Breach notification communication
Internal GDPR compliance assessments performed
Binding corporate rules policy
Whistleblower policy
Rectification request policy
Objection handling policy and systems generated
Log management tool
Vendor management program
ePHI risk assessment report
Vendor termination
Vendor list
Vendor onboarding
Consent for processing captured via explicit opt-in mechanisms
Age verification and parental/guardian consent process enforced
Media disposal training
New employee and contractor agreements
List of newly hired employees & contractors
Existing employee and contractor agreements
Customer onboarding
Records of Processing Activities (RoPA) maintained
Asset register maintaining
Multi-availability zones
Notification workflows regarding rectification or erasure maintained
Risk management program
Risk and Governance Executive Committee meeting minutes
Lawful basis assessment
Legitimate interest assessment
Key management services used
Mobile device management tool configurations
Ticketing tool
Security-related roles
Termination checklist

Subprocessors

Anthropic
AnthropicAI & ML Services
GitHub
GitHubCode & Build Security
Azure
AzureCloud Infrastructure & Platform Services
AWS
AWSCloud Infrastructure & Platform Services

FAQs

Only the customer and users authorized within their organization have access to their data. Intelligine employees do not have access to customer data, prompts, memory, models, or files.

You do. Customers retain full ownership of all data, embeddings, workflows, memory, and custom models. Intelligine never trains on or shares customer data.

Updates follow a formal change management process with testing, version control, and rollback procedures. Breaking changes are never pushed automatically.