TLS 1.3 + AES-256-GCM
GDPR Compliant
ISO 27001 Infrastructure
Zero Text Storage
EU Data Sovereignty

Encryption Layers

Data is protected at every stage with industry-standard and modern cryptographic algorithms. Each layer addresses a specific threat vector.

Data in Transit

TLS 1.3

All data transmitted between clients and servers is encrypted with TLS 1.3, the latest transport layer security protocol. Enforced on all connections with no fallback to older versions.

Data at Rest

AES-256-GCM

Stored data (account credentials, session metadata, token mappings) is encrypted with AES-256-GCM authenticated encryption. Provides both confidentiality and integrity verification.

Enterprise ZK Auth

XChaCha20-Poly1305

Enterprise zero-knowledge authentication uses XChaCha20-Poly1305 for client-side encryption of token mappings. The server never has access to decryption keys.

Key Derivation

Argon2id

Cryptographic keys are derived using Argon2id, the winner of the Password Hashing Competition. Memory-hard and resistant to GPU and ASIC attacks.

Key Recovery

BIP39 Recovery Phrase

Enterprise accounts receive a BIP39 mnemonic recovery phrase for key backup. The same standard used in cryptocurrency wallets for deterministic key recovery.

Zero Text Storage

Text submitted for anonymization is processed entirely in memory and immediately discarded after processing. No original text is ever written to disk, logged, or retained.

In-memory processing only

Immediately discarded after processing

No AI model training on submitted text

No third-party data sharing

No data transfer outside the EU

Data Retention & Lifecycle

Clear data retention policies ensure you know exactly what is stored, for how long, and when it is deleted. Our default is to store nothing.

Data Category Retention Period Details
Submitted text 0 — Not stored Processed in memory and immediately discarded. Never written to disk or logs.
Anonymized output 0 — Not stored Returned to the client and discarded. No server-side copies retained.
Token mappings Session-scoped Reversible token mappings exist only in the client-side encrypted vault. Server has no access.
Account credentials Account lifetime Hashed (bcrypt) or zero-knowledge derived. Deleted on account closure.
Usage metrics 90 days Aggregate counts (requests, characters processed). No PII in metrics.
Audit logs (Enterprise) 90 days – 1 year Authentication events (90 days), admin actions and security events (1 year).

Right to Erasure (GDPR Art. 17): Account deletion removes all associated data within 30 days. Since submitted text is never stored, there is nothing to erase from processing records.

Detection Engines

Two detection engines ensure accurate PII identification with validation mechanisms to prevent false positives and missed detections.

NLP Engine

Microsoft Presidio

Context-aware detection using NLP models. Understands language semantics to identify PII in unstructured text. Supports 48 languages with 320+ entity types.

Pattern Engine

Regex + Validation

Ultra-fast pattern matching with checksum validation. Luhn algorithm for credit cards, IBAN structure validation, format-based recognition for structured data.

Hybrid Mode

Combined Detection

Run both engines in parallel for maximum coverage. NLP catches contextual entities while Pattern validates structured formats. Deduplicated results.

Checksum Validation

False Positive Prevention

Credit card numbers verified with Luhn algorithm. IBANs validated with MOD 97 checksum. Reduces false positives on number-like strings that aren't actual PII.

Deterministic, Not AI: Both engines use deterministic algorithms (NLP models + regex patterns), not generative AI. Your data is never used for model training. All processing happens in-memory with no retention.

Authentication

Multiple authentication methods with layered session security. The authentication model scales from Professional password-based to Enterprise zero-knowledge proof.

Authentication Methods

  • bcrypt — Password hashing for Professional tier accounts
  • Zero-Knowledge Proof — Enterprise tier authentication where the server never sees the password
  • OAuth 2.0 — Google and Microsoft single sign-on
  • 2FA TOTP — Time-based one-time passwords as a second factor

Session Security

  • GeoIP Session Management — Sessions are bound to geographic location; anomalous logins trigger re-authentication
  • Account Lockout — Automatic lockout after 5 consecutive failed authentication attempts
  • Secure Session Tokens — Cryptographically random tokens with configurable expiration

GDPR Compliance

Full GDPR compliance across both Professional and Enterprise tiers. The platform is designed from the ground up with Privacy by Design principles.

Privacy by Design

Data protection is embedded into the architecture from the earliest design stage, not added as an afterthought. Zero text storage is the default, not an option.

Professional Enterprise

DPIA

Data Protection Impact Assessment available for Enterprise deployments. Comprehensive risk analysis for high-risk processing activities involving personal data.

Enterprise

Data Processing Agreement

DPA available for all customers. Defines the scope and purpose of processing, sub-processor obligations, and data subject rights.

Professional Enterprise

Data Subject Rights

Full support for GDPR Articles 15 through 21: access, rectification, erasure, restriction, portability, and objection. 30-day response commitment for all requests.

Professional Enterprise

ISO 27001

Infrastructure operates on ISO 27001 certified hosting. The Enterprise tier includes a fully documented Information Security Management System.

Professional

86% Implemented

Professional infrastructure implements 86% of ISO 27001 controls. Hosted on Hetzner ISO 27001 certified data centers with inherited physical and environmental security controls.

  • ISO 27001 certified data center infrastructure
  • Inherited physical security controls
  • Network segmentation and access controls
  • Encrypted storage and transport
  • Automated security patching
Enterprise

Certified Infrastructure

Enterprise deployments run on fully ISO 27001 certified infrastructure with a documented ISMS covering all Annex A controls applicable to the anonymization service.

  • Full ISO 27001 certified infrastructure
  • Documented ISMS with 5 core policies
  • RBAC: Admin, Editor, User roles
  • Incident response with defined SLAs
  • Comprehensive audit logging
  • Annual review and continuous improvement

EU AI Act Compliance

EU AI Act Full Enforcement: August 2, 2026. High-risk AI systems must demonstrate data governance compliance. Penalties: up to €35 million or 7% of global annual turnover.

The EU AI Act imposes strict data governance requirements on AI systems. anonymize.solutions addresses Article 10 (Data Governance) and Article 11 (Technical Documentation) obligations for organisations using AI in high-risk contexts.

Article 10 — Data Governance

High-risk AI systems must document all personal data in training datasets. anonymize.solutions detects and removes PII from training data and documents findings for Article 10 audit trails.

High-Risk AI

Article 11 — Technical Documentation

Maintain records of all data processing operations. Export scan results as HTML, JSON, or CSV. Audit-ready reports demonstrate due diligence for supervisory authority submissions.

All AI Systems

Zero-Knowledge + Data Minimisation

Our Zero-Knowledge architecture aligns with EU AI Act data minimisation principles. Results are never stored. Processing is in-memory only — we physically cannot access your scan data.

Privacy by Design

Free Website Audit — piisafe.eu

Scan your AI documentation and training data catalogs for exposed PII before the August 2026 enforcement deadline. Free, no registration required, results in 60 seconds.

EU AI Act Penalty Structure

Violation Type Fixed Amount % of Global Turnover
Prohibited AI practices Up to €35 million 7%
High-risk AI non-compliance Up to €15 million 3%
Incorrect information to authorities Up to €7.5 million 1.5%

Example: A company with €1 billion annual turnover could face fines up to €70 million (7%) for prohibited AI practices.

Information Security Management System

The Enterprise ISMS comprises five core policies, role-based access control, a tiered incident response framework, and comprehensive audit logging.

ISMS Policies

Policy ID Policy Name
ISMS-POL-001 Information Security Policy
ISMS-POL-002 Access Control Policy
ISMS-POL-003 Data Classification Policy
ISMS-POL-004 Incident Response Policy
ISMS-POL-005 Business Continuity Policy

Role-Based Access Control

Admin

Full system access. User management, configuration, audit log access, and incident response authority.

Editor

Content and workflow management. Can create and manage anonymization sessions, manage token mappings, and access team features.

User

Standard anonymization access. Can analyze and anonymize text, manage own sessions, and view own usage.

Incident Response SLAs

Priority Description Response Time
P1 — Critical Data breach, system compromise, or complete service outage < 1 hour
P2 — High Significant security vulnerability or major feature degradation < 4 hours
P3 — Medium Non-critical security issue or minor service impact < 24 hours
P4 — Low Informational security observation or improvement request < 72 hours

GDPR-mandated 72-hour breach notification to supervisory authorities for confirmed personal data breaches. Affected data subjects notified without undue delay when the breach is likely to result in a high risk to their rights and freedoms. Learn how PII anonymization prevents data breaches →

Audit Logging Retention

Auth Events

90 Days

Login attempts, session creation, authentication failures, password changes, and 2FA events.

Admin Actions

1 Year

User management, role changes, configuration modifications, and system administration events.

Security Events

1 Year

Incident records, access anomalies, policy violations, and security-relevant system events.

OWASP Top 10 Protection

The application is hardened against the OWASP Top 10 web application security risks. HTTP security headers enforce strict browser-side protections.

Security Headers

Strict-Transport-Security
HSTS enforces HTTPS-only connections with a long max-age directive.
Content-Security-Policy
CSP restricts resource loading to explicitly allowed origins.
X-Frame-Options
Prevents clickjacking by blocking page embedding in iframes.
X-Content-Type-Options
Prevents MIME-type sniffing with nosniff directive.
Referrer-Policy
Controls referrer information sent with requests to protect user privacy.
Permissions-Policy
Restricts browser features (camera, microphone, geolocation) to prevent abuse.

Bot Protection

All forms and authentication endpoints are protected by Google reCAPTCHA v3 with a 0.5 score threshold. reCAPTCHA v3 operates invisibly, scoring requests based on behavioral analysis without requiring user interaction.

reCAPTCHA v3 Score Threshold: 0.5 Invisible Behavioral Analysis

Test Our Security on Live Platforms

Don't just take our word for it. Try our platforms and verify our security claims yourself.

Zero-Knowledge Architecture

Watch client-side encryption happen in real-time. Your password never leaves your device.

Try Desktop App ↗

EU Data Sovereignty

All processing on ISO 27001-certified Hetzner servers in Germany. Inspect network traffic.

Try Legal Platform ↗

No Data Storage

Text processed in memory only. Monitor your browser's network tab - no document storage.

Try Enterprise API ↗

Audit Trail (Enterprise)

See enterprise logging demo with full audit trails for compliance requirements.

Try Enterprise Demo ↗

Security Questions?

Request a detailed security assessment or discuss specific compliance requirements for your organization.