Skip to main content

Compliance

Tegendo.AI is committed to meeting the compliance requirements of enterprise organizations. This page outlines our current compliance posture, certifications, and roadmap.

Current compliance posture

Tegendo.AI implements security controls aligned with industry-standard frameworks. While we are in the process of obtaining formal certifications, our platform is designed and operated to meet the requirements of the following standards.

SOC 2 Type II

Status: In progress — audit scheduled Tegendo.AI is pursuing SOC 2 Type II certification, which evaluates the design and operating effectiveness of controls related to security, availability, and confidentiality. Our SOC 2 readiness includes:
Trust Service CriteriaImplementation
SecurityEncryption at rest (AES-256) and in transit (TLS 1.3), SSO/SCIM, RBAC, audit logging, vulnerability management
AvailabilityMulti-AZ deployment, automated failover, 99.9% uptime SLA, monitoring and alerting
ConfidentialityTenant isolation via RLS, data retention policies, encryption, access controls
Processing IntegrityInput validation, automated testing, deployment pipelines with approval gates
PrivacyData minimization, configurable retention, right to deletion, privacy policy

GDPR

Status: Compliant by design Tegendo.AI is designed to comply with the General Data Protection Regulation (GDPR) for organizations operating in or serving the European Union. Key GDPR controls:
  • Data Processing Agreement (DPA) — Available for all enterprise customers
  • Data minimization — We collect only the data necessary to provide the service
  • Right to access — Users can export all their data at any time
  • Right to deletion — Users and admins can delete conversations and account data
  • Data portability — Conversations can be exported in JSON format
  • Configurable retention — Admins set retention periods aligned with their GDPR policies
  • Breach notification — Customers are notified within 72 hours of a confirmed data breach
  • Sub-processors — We maintain a list of sub-processors (AI providers, infrastructure) and notify customers of changes
Tegendo.AI can be configured to route data through EU-based infrastructure for organizations with data residency requirements. Contact sales@tegendo.ai for EU data residency options.

HIPAA

Status: Roadmap — 2026 Tegendo.AI does not currently hold HIPAA certification and should not be used to process Protected Health Information (PHI). HIPAA compliance is on our roadmap for 2026, including:
  • Business Associate Agreement (BAA)
  • PHI encryption and access controls
  • Audit logging meeting HIPAA requirements
  • Workforce training and policy documentation

CCPA / CPRA

Status: Compliant Tegendo.AI complies with the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA):
  • Users can request access to their personal data
  • Users can request deletion of their personal data
  • We do not sell personal data to third parties
  • Our privacy policy discloses data collection practices

AI provider compliance

Tegendo.AI integrates with AI providers under enterprise agreements that include data protection commitments:
ProviderAgreementTraining data opt-outData retention
AnthropicEnterprise API agreementYes — data not used for trainingNot retained after processing
OpenAIEnterprise API agreementYes — data not used for trainingNot retained after processing
Google (Gemini)Enterprise API agreementYes — data not used for trainingNot retained after processing
These commitments apply when using Tegendo.AI’s managed API keys or BYOK with enterprise-tier provider accounts. If your organization uses consumer-tier provider API keys via BYOK, the provider’s consumer data policies may apply.

Security practices

Vulnerability management

  • Dependency scanning — Automated scanning of all dependencies for known vulnerabilities using Dependabot and Snyk
  • Container scanning — Docker images are scanned before deployment
  • Static analysis — Code is analyzed for security issues during CI/CD
  • Penetration testing — Annual third-party penetration testing
  • Bug bounty — Responsible disclosure program for security researchers

Business continuity

  • Backups — Database backups every 24 hours with 30-day retention
  • Disaster recovery — Recovery point objective (RPO) of 24 hours, recovery time objective (RTO) of 4 hours
  • Multi-AZ — Infrastructure deployed across multiple AWS availability zones
  • Incident response — Documented incident response plan with defined escalation procedures

Employee security

  • Background checks — All employees undergo background checks
  • Security training — Mandatory security awareness training annually
  • Least privilege — Employees are granted minimum necessary access
  • Access reviews — Quarterly reviews of employee access to production systems

Compliance roadmap

StandardStatusTarget date
SOC 2 Type IIAudit in progressQ3 2026
GDPRCompliantCurrent
CCPA / CPRACompliantCurrent
HIPAAPlannedQ4 2026
ISO 27001PlannedQ1 2027
FedRAMPEvaluatingTBD

Requesting compliance documentation

Enterprise customers can request:
  • SOC 2 readiness report
  • Data Processing Agreement (DPA)
  • Security questionnaire responses
  • Vendor risk assessment documentation
  • Sub-processor list
Contact security@tegendo.ai or your account manager to request documentation.