Compliance
We protect your data, and never use it for model trainings without your agreements.





Our Philosophy
Our security program is multi-faceted and covers compliance, application security, and infrastructure security, fully complying with SSAE18 SOC2 controls covering Confidentiality, Availability, and Security.

Data Protection
We follow industry standard best practices around data security, compliance, and privacy.

Proactive Defense
Indigenous evolving practices and annual audits validate your data's safety and compliance.

Artificial Intelligence (AI)
Your data remains private. Our AI sub-processors are barred from using customer data for training.
Top-Tier Standards for Data Protection
SAML SSO 2.0
Providing secure, seamless single sign-on access. Read more about it here.
SCIM Provisioning
Automated, secure identity management across applications via SCIM provisioning.
Audit Logs
Keeping comprehensive logs for transparency and accountability.
Analytics
Delivering data insights with strong security controls.
Protected Sharing
Ensuring only authorized users access your content.
Roles-Based Permission
Enterprise customers can customize access to protect sensitive information.
PCI-DSS Compliant
Meeting Payment Card Industry Data Security Standards by utilizing Stripe.
SOC Compliance
SOC compliance verifies the effectiveness of a company's data security controls over time.
App Penetration Testing
Indigenius hires specializes in web application security to test our platform regularly.

Encryption
We use robust encryption protocols to protect your sensitive data, ensuring your content remains private and secure at all times. For encryption at rest, AES-256 is utilized. AES-256 is a strong encryption standard that uses a 256-bit key to securely encrypt and decrypt data, providing robust protection against unauthorized access. For encryption in transit, HTTPS 1.3 and 1.2 are supported.
Proactive Data Defense
Our security practices continuously evolve to counter new threats. We stay ahead of risks through proactive monitoring and regular updates.
Annual Audit
We undergo regular third-party audits to verify our security measures.
Incident Response Planning
We undergo incident response exercises to test our defensive security processes.
Business and Disaster Recovery
We're prepared for the unexpected to ensure continuity.
Cyber Insurance
Providing an extra layer of protection for our users.
Data Deletion on Request
Respecting your privacy and complying with (data subject access right) deletion requests.
Penetration Testing
Conducting annual tests to find and fix vulnerabilities.
Sub-processors List Available
Being transparent about our partners and their roles.
Data Processing Agreement
Committing to data protection through enforceable agreements.
Centralized IAM Solution
Efficiently managing employee access to sensitive information.
Artificial
intelligence (AI)
Indigenius uses AI to enhance the core product experience, delivering significant value to our users in their everyday work. We prioritize security, reliability, and user-centric design to ensure a safe and dependable experience.
Generative AI Platforms
Data Processing AI
Data Usage for Training Models
Data processed by our AI models will not be used to train public LLM models. These business-grade APIs come with guarantees:
- Data will not train public LLMs.
- Data will be retained for a maximum of 30 days to mitigate against abuse.