LEGAL · SECURITY · EFFECTIVE APRIL 14, 2026

Security policy.

AuraOne maintains a security program for high-stakes AI workflows where evaluations, human review, approvals, and evidence exports remain connected. This page summarizes the legal and buyer-review posture. Detailed deployment and control materials are shared during procurement or security review because the relevant answers depend on the program boundary, deployment model, and regulated context.

SOC 2
Type II

Independent attestation across security, availability, and confidentiality.

HIPAA
Aligned

Administrative, technical, and physical safeguards for protected health workflows.

GDPR
Compliant

Data subject rights, residency, and processor obligations honored by design.

TRUST SIGNALS · VERIFIED POSTURE

The three frameworks buyers ask about.

Attestations and alignments below match the compliance badges in the footer. Each card anchors a section further down with the relevant control map.

SOC 2
TYPE II

Independent attestation. Renewed yearly.

Trust Services Criteria covering security, availability, and confidentiality. Reports shared under NDA during security review.

ScopeSecurity · Availability · Confidentiality
ATTESTED
Audit periodRolling 12 months
CURRENT
Evidence packetAuditor letter · controls map
ON REQUEST
Jump to #soc2
HIPAA
ALIGNED

Safeguards for protected health workflows.

Administrative, technical, and physical safeguards mapped to the HIPAA Security Rule. BAAs available for in-scope deployments.

SafeguardsAdmin · technical · physical
MAPPED
BAAExecuted per program
ON REQUEST
PHI handlingWorkflow-scoped boundary
REVIEWED
Jump to #hipaa
GDPR
COMPLIANT

Processor obligations honored by design.

Data subject rights, lawful basis, residency, and sub-processor disclosures handled at the program scope, not the marketing page.

DPAStandard contractual clauses
AVAILABLE
ResidencyRegion-scoped per program
CONFIGURABLE
DSARDocumented response path
OPERATIONAL
Jump to #gdpr
SECURITY PRACTICES · CONTROL FRAMEWORK

What stays on every release.

The control framework is not a marketing surface. These are the controls a buyer security team will ask about, mapped to the workflow boundary AuraOne actually operates inside.

01

Encryption

Encryption in transit and at rest across the core platform boundary. Key rotation, scope, and customer-managed key options reviewed per deployment.

↳ CONTROL
02

Access controls

Least-privilege access for operators, reviewers, and administrators. Role-based permissions aligned to workflow ownership and release approvals. Enterprise identity options discussed during procurement.

↳ CONTROL
03

Audit logging

Security and workflow events stay visible in the same audit trail. Escalations, approvals, and review actions are captured as part of the evidence trail.

↳ CONTROL
04

Incident response

Documented internal procedures cover triage, scope confirmation, customer notification, and post-incident review. Disclosure follow-up routes through the security channel.

↳ CONTROL
05

Retention

Program-specific retention and deletion workflows scoped during onboarding. Clear handling boundaries for uploaded data, evidence exports, and reviewer access.

↳ CONTROL
FRAMEWORK DETAIL · ANCHORED REFERENCES

Each badge in the footer lands here.

The deep links from the compliance badges (#soc2, #hipaa, #gdpr) resolve to the sections below. Each entry summarizes scope and obligations without re-stating the full evidence packet.

FRAMEWORK · SOC 2 TYPE II

SOC 2 Type II. Attested, not asserted.

SOC 2 covers how AuraOne operates the platform — who has access, how changes ship, how incidents get handled. The attestation is renewed yearly by an independent auditor.

  • ·Trust Services Criteria — security, availability, confidentiality.
  • ·Auditor letter and bridge letters shared under NDA during security review.
  • ·Controls map aligned to evaluation, review, approval, and export workflows.
  • ·Sub-processor list and material change notifications maintained per program.
FRAMEWORK · HIPAA

HIPAA aligned. Where the workflow touches PHI.

AuraOne supports HIPAA-aligned deployments where the program scope includes protected health information. Safeguards are mapped to the HIPAA Security Rule and reviewed during onboarding.

  • ·Administrative safeguards — workforce training, access management, contingency planning.
  • ·Technical safeguards — access control, audit controls, integrity, transmission security.
  • ·Physical safeguards — facility access controls aligned to the underlying infrastructure.
  • ·Business Associate Agreement executed before any PHI enters the workflow boundary.
FRAMEWORK · GDPR

GDPR compliant. Processor obligations honored.

AuraOne processes customer data as a processor under GDPR. Data subject rights, lawful basis, residency, and sub-processor disclosure are handled at the program scope.

  • ·Data Processing Addendum with standard contractual clauses available.
  • ·Region-scoped residency configurable per program; no cross-region transfer without explicit scope.
  • ·Documented response path for data subject access, rectification, and erasure requests.
  • ·Sub-processor list and material change notifications maintained per program.
NEXT STEP · SECURITY REVIEW

Bring the rollout. We will match the materials.

For procurement, trust review, or responsible disclosure, use the security channel or book a buyer-readiness review. We will match the materials to your workflow, regulated context, and deployment plan.

Security Policy and Review Materials | AuraOne | AuraOne