Security & Compliance
Multi-layered encryption, zero text storage, GDPR compliance, and ISO 27001 certified infrastructure. Every design decision prioritizes data protection and EU data sovereignty.
Encryption Layers
Data is protected at every stage with industry-standard and modern cryptographic algorithms. Each layer addresses a specific threat vector.
TLS 1.3
All data transmitted between clients and servers is encrypted with TLS 1.3, the latest transport layer security protocol. Enforced on all connections with no fallback to older versions.
AES-256-GCM
Stored data (account credentials, session metadata, token mappings) is encrypted with AES-256-GCM authenticated encryption. Provides both confidentiality and integrity verification.
XChaCha20-Poly1305
Enterprise zero-knowledge authentication uses XChaCha20-Poly1305 for client-side encryption of token mappings. The server never has access to decryption keys.
Argon2id
Cryptographic keys are derived using Argon2id, the winner of the Password Hashing Competition. Memory-hard and resistant to GPU and ASIC attacks.
BIP39 Recovery Phrase
Enterprise accounts receive a BIP39 mnemonic recovery phrase for key backup. The same standard used in cryptocurrency wallets for deterministic key recovery.
Zero Text Storage
Text submitted for anonymization is processed entirely in memory and immediately discarded after processing. No original text is ever written to disk, logged, or retained.
In-memory processing only
Immediately discarded after processing
No AI model training on submitted text
No third-party data sharing
No data transfer outside the EU
Data Retention & Lifecycle
Clear data retention policies ensure you know exactly what is stored, for how long, and when it is deleted. Our default is to store nothing.
| Data Category | Retention Period | Details |
|---|---|---|
| Submitted text | 0 — Not stored | Processed in memory and immediately discarded. Never written to disk or logs. |
| Anonymized output | 0 — Not stored | Returned to the client and discarded. No server-side copies retained. |
| Token mappings | Session-scoped | Reversible token mappings exist only in the client-side encrypted vault. Server has no access. |
| Account credentials | Account lifetime | Hashed (bcrypt) or zero-knowledge derived. Deleted on account closure. |
| Usage metrics | 90 days | Aggregate counts (requests, characters processed). No PII in metrics. |
| Audit logs (Enterprise) | 90 days – 1 year | Authentication events (90 days), admin actions and security events (1 year). |
Right to Erasure (GDPR Art. 17): Account deletion removes all associated data within 30 days. Since submitted text is never stored, there is nothing to erase from processing records.
Detection Engines
Two detection engines ensure accurate PII identification with validation mechanisms to prevent false positives and missed detections.
Microsoft Presidio
Context-aware detection using NLP models. Understands language semantics to identify PII in unstructured text. Supports 48 languages with 320+ entity types.
Regex + Validation
Ultra-fast pattern matching with checksum validation. Luhn algorithm for credit cards, IBAN structure validation, format-based recognition for structured data.
Combined Detection
Run both engines in parallel for maximum coverage. NLP catches contextual entities while Pattern validates structured formats. Deduplicated results.
False Positive Prevention
Credit card numbers verified with Luhn algorithm. IBANs validated with MOD 97 checksum. Reduces false positives on number-like strings that aren't actual PII.
Deterministic, Not AI: Both engines use deterministic algorithms (NLP models + regex patterns), not generative AI. Your data is never used for model training. All processing happens in-memory with no retention.
Authentication
Multiple authentication methods with layered session security. The authentication model scales from Professional password-based to Enterprise zero-knowledge proof.
Authentication Methods
- bcrypt — Password hashing for Professional tier accounts
- Zero-Knowledge Proof — Enterprise tier authentication where the server never sees the password
- OAuth 2.0 — Google and Microsoft single sign-on
- 2FA TOTP — Time-based one-time passwords as a second factor
Session Security
- GeoIP Session Management — Sessions are bound to geographic location; anomalous logins trigger re-authentication
- Account Lockout — Automatic lockout after 5 consecutive failed authentication attempts
- Secure Session Tokens — Cryptographically random tokens with configurable expiration
GDPR Compliance
Full GDPR compliance across both Professional and Enterprise tiers. The platform is designed from the ground up with Privacy by Design principles.
Privacy by Design
Data protection is embedded into the architecture from the earliest design stage, not added as an afterthought. Zero text storage is the default, not an option.
DPIA
Data Protection Impact Assessment available for Enterprise deployments. Comprehensive risk analysis for high-risk processing activities involving personal data.
Data Processing Agreement
DPA available for all customers. Defines the scope and purpose of processing, sub-processor obligations, and data subject rights.
Data Subject Rights
Full support for GDPR Articles 15 through 21: access, rectification, erasure, restriction, portability, and objection. 30-day response commitment for all requests.
ISO 27001
Infrastructure operates on ISO 27001 certified hosting. The Enterprise tier includes a fully documented Information Security Management System.
86% Implemented
Professional infrastructure implements 86% of ISO 27001 controls. Hosted on Hetzner ISO 27001 certified data centers with inherited physical and environmental security controls.
- ISO 27001 certified data center infrastructure
- Inherited physical security controls
- Network segmentation and access controls
- Encrypted storage and transport
- Automated security patching
Certified Infrastructure
Enterprise deployments run on fully ISO 27001 certified infrastructure with a documented ISMS covering all Annex A controls applicable to the anonymization service.
- Full ISO 27001 certified infrastructure
- Documented ISMS with 5 core policies
- RBAC: Admin, Editor, User roles
- Incident response with defined SLAs
- Comprehensive audit logging
- Annual review and continuous improvement
EU AI Act Compliance
EU AI Act Full Enforcement: August 2, 2026. High-risk AI systems must demonstrate data governance compliance. Penalties: up to €35 million or 7% of global annual turnover.
The EU AI Act imposes strict data governance requirements on AI systems. anonymize.solutions addresses Article 10 (Data Governance) and Article 11 (Technical Documentation) obligations for organisations using AI in high-risk contexts.
Article 10 — Data Governance
High-risk AI systems must document all personal data in training datasets. anonymize.solutions detects and removes PII from training data and documents findings for Article 10 audit trails.
Article 11 — Technical Documentation
Maintain records of all data processing operations. Export scan results as HTML, JSON, or CSV. Audit-ready reports demonstrate due diligence for supervisory authority submissions.
Zero-Knowledge + Data Minimisation
Our Zero-Knowledge architecture aligns with EU AI Act data minimisation principles. Results are never stored. Processing is in-memory only — we physically cannot access your scan data.
Free Website Audit — piisafe.eu
Scan your AI documentation and training data catalogs for exposed PII before the August 2026 enforcement deadline. Free, no registration required, results in 60 seconds.
EU AI Act Penalty Structure
| Violation Type | Fixed Amount | % of Global Turnover |
|---|---|---|
| Prohibited AI practices | Up to €35 million | 7% |
| High-risk AI non-compliance | Up to €15 million | 3% |
| Incorrect information to authorities | Up to €7.5 million | 1.5% |
Example: A company with €1 billion annual turnover could face fines up to €70 million (7%) for prohibited AI practices.
Information Security Management System
The Enterprise ISMS comprises five core policies, role-based access control, a tiered incident response framework, and comprehensive audit logging.
ISMS Policies
| Policy ID | Policy Name |
|---|---|
| ISMS-POL-001 | Information Security Policy |
| ISMS-POL-002 | Access Control Policy |
| ISMS-POL-003 | Data Classification Policy |
| ISMS-POL-004 | Incident Response Policy |
| ISMS-POL-005 | Business Continuity Policy |
Role-Based Access Control
Admin
Full system access. User management, configuration, audit log access, and incident response authority.
Editor
Content and workflow management. Can create and manage anonymization sessions, manage token mappings, and access team features.
User
Standard anonymization access. Can analyze and anonymize text, manage own sessions, and view own usage.
Incident Response SLAs
| Priority | Description | Response Time |
|---|---|---|
| P1 — Critical | Data breach, system compromise, or complete service outage | < 1 hour |
| P2 — High | Significant security vulnerability or major feature degradation | < 4 hours |
| P3 — Medium | Non-critical security issue or minor service impact | < 24 hours |
| P4 — Low | Informational security observation or improvement request | < 72 hours |
GDPR-mandated 72-hour breach notification to supervisory authorities for confirmed personal data breaches. Affected data subjects notified without undue delay when the breach is likely to result in a high risk to their rights and freedoms. Learn how PII anonymization prevents data breaches →
Audit Logging Retention
90 Days
Login attempts, session creation, authentication failures, password changes, and 2FA events.
1 Year
User management, role changes, configuration modifications, and system administration events.
1 Year
Incident records, access anomalies, policy violations, and security-relevant system events.
OWASP Top 10 Protection
The application is hardened against the OWASP Top 10 web application security risks. HTTP security headers enforce strict browser-side protections.
Security Headers
Bot Protection
All forms and authentication endpoints are protected by Google reCAPTCHA v3 with a 0.5 score threshold. reCAPTCHA v3 operates invisibly, scoring requests based on behavioral analysis without requiring user interaction.
Test Our Security on Live Platforms
Don't just take our word for it. Try our platforms and verify our security claims yourself.
Zero-Knowledge Architecture
Watch client-side encryption happen in real-time. Your password never leaves your device.
Try Desktop App ↗EU Data Sovereignty
All processing on ISO 27001-certified Hetzner servers in Germany. Inspect network traffic.
Try Legal Platform ↗No Data Storage
Text processed in memory only. Monitor your browser's network tab - no document storage.
Try Enterprise API ↗Audit Trail (Enterprise)
See enterprise logging demo with full audit trails for compliance requirements.
Try Enterprise Demo ↗Security Questions?
Request a detailed security assessment or discuss specific compliance requirements for your organization.