Security & Privacy

Your data protection is our top priority

🔒

Enterprise-Grade Protection

We use the same security infrastructure trusted by Fortune 500 companies to protect your sensitive business data.

How We Protect Your Data

🔐

Encryption at Rest

All uploaded files are encrypted using AES-256 encryption, the same standard used by banks and government agencies.

🌐

Encryption in Transit

All data transfers use TLS 1.3 encryption, ensuring your files are protected during upload and download.

🔑

Secure Access

Magic links expire automatically and provide single-use access. No passwords to remember or steal.

🏢

SOC 2 Infrastructure

Our cloud infrastructure (AWS) maintains SOC 2 Type II compliance, with regular third-party audits.

🔍

PII Detection

Automatic scanning identifies sensitive personal information, allowing us to handle it with extra care.

🗑️

Data Retention

Your data is retained only as long as needed for your project. Request deletion anytime.

Our Data Handling Practices

Limited Access

Only your assigned AJES team members can access your files

No Third-Party Sharing

We never sell or share your data with third parties

Audit Logging

All file access is logged for accountability

Secure Deletion

When files are deleted, they're permanently removed

AI & Your Privacy

Our AI-powered analysis tools process your data securely. Here's what you should know:

  • Your data is never used to train AI models
  • Analysis happens in isolated, secure environments
  • AI outputs are reviewed by human consultants before delivery
  • You can request AI-free analysis if preferred

Questions?

If you have specific security requirements or questions about how we handle your data, we're happy to discuss.

Contact Our Security Team